Hello Guest! Welcome to my PARADISE.
Something you might want to know about us.
Don't be hesitated to contact us if you have something to say.

Friday, April 3, 2009

A BASIC GUIDE TO THE INTERNET

http://blog.apogee.gr/files/globe_Europe.jpg
The Internet is a computer network made up of thousands of networks worldwide. No one knows exactly how many computers are connected to the Internet. It is certain, however, that these number in the millions.

No one is in charge of the Internet. There are organizations which develop technical aspects of this network and set standards for creating applications on it, but no governing body is in control. The Internet backbone, through which Internet traffic flows, is owned by private companies.

All computers on the Internet communicate with one another using the Transmission Control Protocol/Internet Protocol suite, abbreviated to TCP/IP. Computers on the Internet use a client/server architecture. This means that the remote server machine provides files and services to the user's local client machine. Software can be installed on a client computer to take advantage of the latest access technology.

An Internet user has access to a wide variety of services: electronic mail, file transfer, vast information resources, interest group membership, interactive collaboration, multimedia displays, real-time broadcasting, shopping opportunities, breaking news, and much more.

The Internet consists primarily of a variety of access protocols. Many of these protocols feature programs that allow users to search for and retrieve material made available by the protocol.


--------------------------------------------------------------------------------

COMPONENTS OF THE INTERNET

--------------------------------------------------------------------------------

WORLD WIDE WEB

The World Wide Web (abbreviated as the Web or WWW) is a system of Internet servers that supports hypertext to access several Internet protocols on a single interface. Almost every protocol type available on the Internet is accessible on the Web. This includes e-mail, FTP, Telnet, and Usenet News. In addition to these, the World Wide Web has its own protocol: HyperText Transfer Protocol, or HTTP. These protocols will be explained later in this document.

The World Wide Web provides a single interface for accessing all these protocols. This creates a convenient and user-friendly environment. It is no longer necessary to be conversant in these protocols within separate, command-level environments. The Web gathers together these protocols into a single system. Because of this feature, and because of the Web's ability to work with multimedia and advanced programming languages, the Web is the fastest-growing component of the Internet.

The operation of the Web relies primarily on hypertext as its means of information retrieval. HyperText is a document containing words that connect to other documents. These words are called links and are selectable by the user. A single hypertext document can contain links to many documents. In the context of the Web, words or graphics may serve as links to other documents, images, video, and sound. Links may or may not follow a logical path, as each connection is programmed by the creator of the source document. Overall, the Web contains a complex virtual web of connections among a vast number of documents, graphics, videos, and sounds.

Producing hypertext for the Web is accomplished by creating documents with a language called HyperText Markup Language, or HTML. With HTML, tags are placed within the text to accomplish document formatting, visual features such as font size, italics and bold, and the creation of hypertext links. Graphics and multimedia may also be incorporated into an HTML document. HTML is an evolving language, with new tags being added as each upgrade of the language is developed and released. The World Wide Web Consortium (W3C), led by Web founder Tim Berners-Lee, coordinates the efforts of standardizing HTML. The W3C now calls the language XHTML and considers it to be an application of the XML language standard.

The World Wide Web consists of files, called pages or home pages, containing links to documents and resources throughout the Internet.

The Web provides a vast array of experiences including multimedia presentations, real-time collaboration, interactive pages, radio and television broadcasts, and the automatic "push" of information to a client computer. Programming languages such as Java, JavaScript, Visual Basic, Cold Fusion and XML are extending the capabilities of the Web. A growing amount of information on the Web is served dynamically from content stored in databases. The Web is therefore not a fixed entity, but one that is in a constant state of development and flux.

For more complete information about the World Wide Web, see Understanding The World Wide Web.

E-MAIL

Electronic mail, or e-mail, allows computer users locally and worldwide to exchange messages. Each user of e-mail has a mailbox address to which messages are sent. Messages sent through e-mail can arrive within a matter of seconds.

A powerful aspect of e-mail is the option to send electronic files to a person's e-mail address. Non-ASCII files, known as binary files, may be attached to e-mail messages. These files are referred to as MIME attachments.MIME stands for Multimedia Internet Mail Extension, and was developed to help e-mail software handle a variety of file types. For example, a document created in Microsoft Word can be attached to an e-mail message and retrieved by the recipient with the appropriate e-mail program. Many e-mail programs, including Eudora, Netscape Messenger, and Microsoft Outlook, offer the ability to read files written in HTML, which is itself a MIME type.

TELNET

Telnet is a program that allows you to log into computers on the Internet and use online databases, library catalogs, chat services, and more. There are no graphics in Telnet sessions, just text. To Telnet to a computer, you must know its address. This can consist of words (locis.loc.gov) or numbers (140.147.254.3). Some services require you to connect to a specific port on the remote computer. In this case, type the port number after the Internet address. Example: telnet nri.reston.va.us 185.

Telnet is available on the World Wide Web. Probably the most common Web-based resources available through Telnet have been library catalogs, though most catalogs have since migrated to the Web. A link to a Telnet resource may look like any other link, but it will launch a Telnet session to make the connection. A Telnet program must be installed on your local computer and configured to your Web browser in order to work.

With the increasing popularity of the Web, Telnet has become less frequently used as a means of access to information on the Internet.


FTP

FTP stands for File Transfer Protocol. This is both a program and the method used to transfer files between computers. Anonymous FTP is an option that allows users to transfer files from thousands of host computers on the Internet to their personal computer account. FTP sites contain books, articles, software, games, images, sounds, multimedia, course work, data sets, and more.

If your computer is directly connected to the Internet via an Ethernet cable, you can use one of several PC software programs, such as WS_FTP for Windows, to conduct a file transfer.

FTP transfers can be performed on the World Wide Web without the need for special software. In this case, the Web browser will suffice. Whenever you download software from a Web site to your local machine, you are using FTP. You can also retrieve FTP files via search engines such as FtpFind, located at /http://www.ftpfind.com/. This option is easiest because you do not need to know FTP program commands.

E-MAIL DISCUSSION GROUPS

One of the benefits of the Internet is the opportunity it offers to people worldwide to communicate via e-mail. The Internet is home to a large community of individuals who carry out active discussions organized around topic-oriented forums distributed by e-mail. These are administered by software programs. Probably the most common program is the listserv.

A great variety of topics are covered by listservs, many of them academic in nature. When you subscribe to a listserv, messages from other subscribers are automatically sent to your electronic mailbox. You subscribe to a listserv by sending an e-mail message to a computer program called a listserver. Listservers are located on computer networks throughout the world. This program handles subscription information and distributes messages to and from subscribers. You must have a e-mail account to participate in a listserv discussion group. Visit Tile.net at /http://tile.net/ to see an example of a site that offers a searchablecollection of e-mail discussion groups.

Majordomo and Listproc are two other programs that administer e-mail discussion groups. The commands for subscribing to and managing your list memberships are similar to those of listserv.

USENET NEWS

Usenet News is a global electronic bulletin board system in which millions of computer users exchange information on a vast range of topics. The major difference between Usenet News and e-mail discussion groups is the fact that Usenet messages are stored on central computers, and users must connect to these computers to read or download the messages posted to these groups. This is distinct from e-mail distribution, in which messages arrive in the electronic mailboxes of each list member.

Usenet itself is a set of machines that exchanges messages, or articles, from Usenet discussion forums, called newsgroups. Usenet administrators control their own sites, and decide which (if any) newsgroups to sponsor and which remote newsgroups to allow into the system.

There are thousands of Usenet newsgroups in existence. While many are academic in nature, numerous newsgroups are organized around recreational topics. Much serious computer-related work takes place in Usenet discussions. A small number of e-mail discussion groups also exist as Usenet newsgroups.

The Usenet newsfeed can be read by a variety of newsreader software programs. For example, the Netscape suite comes with a newsreader program called Messenger. Newsreaders are also available as standalone products.

FAQ, RFC, FYI

FAQ stands for Frequently Asked Questions. These are periodic postings to Usenet newsgroups that contain a wealth of information related to the topic of the newsgroup. Many FAQs are quite extensive. FAQs are available by subscribing to individual Usenet newsgroups. A Web-based collection of FAQ resources has been collected by The Internet FAQ Consortium and is available at /http://www.faqs.org/.

RFC stands for Request for Comments. These are documents created by and distributed to the Internet community to help define the nuts and bolts of the Internet. They contain both technical specifications and general information.

FYI stands for For Your Information. These notes are a subset of RFCs and contain information of interest to new Internet users.

Links to indexes of all three of these information resources are available on the University Libraries Web site at /http://library.albany.edu/reference/faqs.html.

CHAT & INSTANT MESSENGING


Chat programs allow users on the Internet to communicate with each other by typing in real time. They are sometimes included as a feature of a Web site, where users can log into the "chat room" to exchange comments and information about the topics addressed on the site. Chat may take other, more wide-ranging forms. For example, America Online is well known for sponsoring a number of topical chat rooms.

Internet Relay Chat (IRC) is a service through which participants can communicate to each other on hundreds of channels. These channels are usually based on specific topics. While many topics are frivolous, substantive conversations are also taking place. To access IRC, you must use an IRC software program.

A variation of chat is the phenomenon of instant messenging. With instant messenging, a user on the Web can contact another user currently logged in and type a conversation. Most famous is America Online's Instant Messenger. ICQ, MSN and Yahoo are other commonly-used chat programs.

Other types of real-time communication are addressed in the tutorial Understanding the World Wide Web.

MUD/MUSH/MOO/MUCK/DUM/MUSE

MUD stands for Multi User Dimension. MUDs, and their variations listed above, are multi-user virtual reality games based on simulated worlds. Traditionally text based, graphical MUDs now exist. There are MUDs of all kinds on the Internet, and many can be joined free of charge. For more information, read one of the FAQs devoted to MUDs available at the FAQ site at

Wednesday, January 21, 2009

PARENTAL CONTROL COULD BE EFFICIENT WITH THE AID OF KEYLOGGERS??

http://z.hubpages.com/u/240883_f260.jpg

Keystroke logging (often called keylogging) is a method of capturing and recording user keystrokes. The technique and name came from before the era of the graphical user interface; loggers nowadays would expect to capture mouse operations as well. Keylogging can be useful to determine sources of errors in computer systems, to study how users interact and access with systems, and is sometimes used to measure employee productivity on certain clerical tasks. Such systems are also highly useful for both law enforcement and law-breaking—for instance, providing a means to obtain passwords or encryption keys and thus bypassing other security measures. Keyloggers are widely available on the Internet.

There are currently two types of keylogging methods, hardware and software based.

Keystroke logging can be achieved by both hardware and software means. Hardware key loggers are commercially available devices which come in three types: inline devices that are attached to the keyboard cable, devices which can be installed inside standard keyboards, and actual replacement keyboards that contain the key logger already built-in. The inline devices have the advantage of being able to be installed instantly on desktop computers without integrated keyboards.

When used covertly, inline devices are easily detected by a glance at the keyboard connector plugged into the computer. Of the three types, the most difficult to install is also the most difficult to detect. The device that installs inside a keyboard (presumably the keyboard the target has been using all along) requires soldering skill and extended access to the keyboard to be modified. However, once in place, this type of device is virtually undetectable unless specifically looked for.

Types of keystroke loggers

1) Local Machine software Keyloggers are software programs that are designed to work on the target computer’s operating system. From a technical perspective there are four categories:

  • Hypervisor-based: The keylogger resides in a malware hypervisor running underneath the operating system, which remains untouched, except that it effectively becomes a virtual machine. See Blue Pill for a conceptual example.
  • Kernel based: This method is difficult both to write and to combat. Such keyloggers reside at the kernel level and are thus difficult to detect, especially for user-mode applications. They are frequently implemented as rootkits that subvert the operating system kernel and gain unauthorized access to the hardware which makes them very powerful. A keylogger using this method can act as a keyboard driver for example, and thus gain access to any information typed on the keyboard as it goes to the operating system.
  • Hook based: Such keyloggers hook the keyboard with functions provided by the operating system. The operating system warns them any time a key is pressed and it records it.
  • Passive Methods: Here the coder uses operating system APIs like GetAsyncKeyState(), GetForegroundWindow(), etc. to poll the state of the keyboard or to subscribe to keyboard events. These are the easiest to write, but where constant polling of each key is required, they can cause a noticeable increase in CPU usage and can miss the occasional key. A more recent example simply polls the BIOS for preboot authentication PINs that have not been cleared from memory.
  • Form Grabber based logs web form submissions by recording the web browsing .onsubmit event functions. This records form data before it is passed over the internet and bypasses https encryption.

2) Remote Access software Keyloggers are local software keyloggers programmed with an added feature to transmit recorded data out of the target computer and make the data available to the monitor at a remote location. Remote communication is facilitated by one of four methods:

  • Data is uploaded to a website or an ftp account.
  • Data is periodically emailed to a pre-defined email address.
  • Data is wirelessly transmitted by means of an attached hardware system.
  • It allows the monitor to log into the local machine via the internet or ethernet and access the logs stored on the target machine.

3) Hardware Keyloggers are used for keystroke logging by means of a hardware circuit that is attached somewhere in between the computer keyboard and the computer. It logs all keyboard activity to its internal memory, which can subsequently be accessed, for example, by typing in a secret key. A hardware keylogger has an advantage over a software solution; because it is not dependent on the computer's operating system, it will not interfere with any program running on the target machine and hence cannot be detected by any software, however its physical presence may be detected.

4) Remote Access Hardware Keyloggers, otherwise known as Wireless Hardware Keyloggers, work in much the same way as regular hardware keyloggers, except they have the ability to be controlled and monitored remotely by means of a wireless communication standard.

5) Wireless Keylogger sniffers collect packets of data being transferred from a wireless keyboard and its receiver and then attempts to crack the encryption key being used to secure wireless communications between the two devices.

6) Acoustic Keyloggers work by analyzing a recording of the sound created by someone typing on a computer. Each character on the keyboard makes a subtly different acoustic signature when stroked. Using statistical methods, it is then possible to identify which keystroke signature relates to which keyboard character. This is done by analyzing the repetition frequency of similar acoustic keystroke signatures, the timings between different keyboard strokes and other context information such as the probable language in which the user is writing. A fairly long recording (1000 or more keystrokes) is required so that the statistics are meaningful.

7) Electromagnetic Radiation loggers work by passively capturing electromagnetic emissions of a keyboard, without being physically wired to it.

Cracking

Writing software applications for keylogging is trivial, and like any computer program can be distributed as a trojan horse or as part of a virus. What is not trivial however, is installing a keystroke logger without getting caught and downloading data that has been logged without being traced. An attacker that manually connects to a host machine to download logged keystrokes risks being traced. A trojan that sends keylogged data to a fixed e-mail address or IP address risks exposing the attacker.

Trojan

Young and Yung devised several methods for solving this problem and presented them in their 1997 IEEE Security & Privacy paper (their paper from '96 touches on it as well). They presented a deniable password snatching attack in which the keystroke logging trojan is installed using a virus (or worm). An attacker that is caught with the virus or worm can claim to be a victim. The cryptotrojan asymmetrically encrypts the pilfered login/password pairs using the public key of the trojan author and covertly broadcasts the resulting ciphertext. They mentioned that the ciphertext can be steganographically encoded and posted to a public bulletin board (e.g. Usenet).

Ciphertext

Young and Yung also mentioned having the cryptotrojan unconditionally write the asymmetric ciphertexts to the last few unused sectors of every writable disk that is inserted into the machine. The sectors remain marked as unused. This can be done using a USB token. So, the trojan author may be one of dozens or even thousands of people that are given the stolen information. Only the trojan author can decrypt the ciphertext because only the author knows the needed private decryption key. This attack is from the field known as cryptovirology.

Federal Bureau of Investigation

The FBI used a keystroke logger to obtain the PGP passphrase of Nicodemo Scarfo, Jr., son of mob boss Nicodemo Scarfo. Scarfo Jr. pleaded guilty to running an illegal gambling operation in 2002. The FBI has also reportedly developed a trojan-horse-delivered keylogger program known as Magic Lantern.

Use in surveillance software

Some surveillance software has keystroke logging abilities and is advertised to monitor the internet use of minors. Such software has been criticized on privacy grounds, and because it can be used maliciously or to gain unauthorized access to users' computer systems.

Keylogger prevention

Currently there is no easy way to prevent keylogging. In the future, it is believed[who?] that software with secure I/O will be protected from keyloggers. Until then, however, the best strategy is to use common sense and a combination of several methods. It is possible to use software to monitor the connectivity of the keyboard and log the absence as a countermeasure against physical keyloggers. For a PS/2 keyboard, the timeout bit (BIT6 at port 100) has to be monitored. [6] But this only makes sense when the PC is (nearly) always on.

Code signing

64-bit versions of Windows Vista and Server 2008 implement mandatory digital signing of kernel-mode device drivers[7], thereby restricting the installation of key-logging rootkits.

Monitoring what programs are running

A user should constantly observe what programs are installed and running on his or her machine.

Anti-spyware

Anti-spyware applications are able to detect many keyloggers and cleanse them. Responsible vendors of monitoring software support detection by anti-spyware programs, thus preventing abuse of the software.

Firewall

Enabling a firewall does not stop keyloggers per se, but can possibly prevent transmission of the logged material over the net if properly configured.

Network monitors

Network monitors (also known as reverse-firewalls) can be used to alert the user whenever an application attempts to make a network connection. This gives the user the chance to prevent the keylogger from "phoning home" with his or her typed information.

Automatic form filler programs

Automatic form-filling programs can prevent keylogging entirely by not using the keyboard at all. Form fillers are primarily designed for web browsers to fill in checkout pages and log users into their accounts. Once the user's account and credit card information has been entered into the program, it will be automatically entered into forms without ever using the keyboard or clipboard, thereby reducing the possibility that private data is being recorded. (Someone with access to browser internals and/or memory can often still get to this information; if SSL is not used, network sniffers and proxy tools can easily be used to obtain private information too.)

It is important to generate passwords in a fashion that is invisible to keyloggers and screenshot utilities. Using a browser integrated form filler and password generator that does not just pop up a password on the screen is therefore key. Programs that do this can generate and fill passwords without ever using the keyboard or clipboard.

Alternative keyboard layouts

Most keylogging hardware/software assumes that a person is using the standard QWERTY keyboard layout, so by using a layout such as Dvorak, captured keystrokes are nonsense unless converted. For additional security, custom keyboard layouts can be created using tools like the Microsoft Keyboard Layout Creator.

One-time passwords (OTP)

Using one-time passwords is completely keylogger-safe because the recorded password is always invalidated right after it's used. This solution is useful if you are often using public computers where you can't verify what is running on them. One-time passwords also prevent replay attacks where an attacker uses the old information to impersonate. One example is online banking where one-time passwords are implemented and prevents the account from keylogging attacks as well as replay attacks.

Smart cards

Because of the integrated circuit of smart cards, they are not affected by keylogger and other logging attempts. A smart card can process the information and return back a unique challenge every time you login. The information cannot usually be used to login again.

On-screen keyboards

Program-to-program (non-web) keyboards

It is sometimes said that a third-party (or first party) on-screen keyboard program is a good way to combat keyloggers, as it only requires clicks of the mouse. However, this is not always true.

Most on screen keyboards (such as the onscreen keyboard that comes with Microsoft Windows XP) send keyboard event messages to the external target program to type text. Every software keylogger can log these typed characters sent from one program to another. Additionally, some programs also record or take snapshots of what is displayed on the screen (periodically, and/or upon each mouse click).

However, there are some on-screen keyboard programs that do offer some protection, using other techniques described in this article (such as dragging and dropping the password from the on-screen keyboard to the target program).

Web-based keyboards

Web-based on-screen keyboards (written in Javascript, etc.) may provide some degree of protection. At least some commercial keylogging programs do not record typing on a web-based virtual keyboard. (Screenshot recorders are a concern whenever entire passwords are displayed; fast recorders are generally required to capture a sequence of virtual key presses.)

Notably, the game MapleStory uses, in addition to a standard alphanumeric password, a 4-digit PIN code secured by both on-screen keyboard entry and a randomly changing button pattern; there is no real way to get the latter information without logging the screen and mouse movements; another MMORPG called RuneScape makes a similar system available for players to protect their in-game bank accounts.

Anti-keylogging software

Keylogger detection software is also available. Some of this type of software use "signatures" from a list of all known keyloggers. The PC's legitimate users can then periodically run a scan from this list, and the software looks for the items from the list on the hard-drive. One drawback of this approach is that it only protects from keyloggers on the signature-based list, with the PC remaining vulnerable to other keyloggers.

Other detection software doesn't use a signature list, but instead analyzes the working methods of many modules in the PC, allowing it to block the work of many different types of keylogger. One drawback of this approach is that it can also block legitimate, non-keylogging software. Some heuristics-based anti-keyloggers have the option to unblock known good software, but this can cause difficulties for inexperienced users.

Speech recognition

Similar to on-screen keyboards, speech-to-text conversion software can also be used against keyloggers, since there are no typing or mouse movements involved. The weakest point of using voice-recognition software may be how the software sends the recognized text to target software after the recognition took place.

Handwriting recognition and mouse gestures

Also, many PDAs and lately Tablet PCs can already convert pen (also called stylus) movements on their touchscreens to computer understandable text successfully. Mouse gestures utilize this principle by using mouse movements instead of a stylus. Mouse gesture programs convert these strokes to user-definable actions, among others typing text. Similarly, graphics tablets and light pens can be used to input these gestures, however, these are getting used less commonly everyday.

The same potential weakness of speech recognition applies to this technique as well.

Macro expanders/recorders

With the help of many Freeware/Shareware programs, a seemingly meaningless text can be expanded to a meaningful text and most of the time context-sensitively, e.g. "we" can be expanded "en.Wikipedia.org" when a browser window has the focus. The biggest weakness of this technique is that these programs send their keystrokes directly to the target program. However, this can be overcome by using the 'alternating' technique described below, i.e. sending mouse clicks to non-responsive areas of the target program, sending meaningless keys, sending another mouse click to target area (e.g. password field) and switching back and forth.

Window transparency

Using many readily available utilities, the target window could be made temporarily transparent, in order to hinder screen-capturing by advanced keyloggers.[citation needed] Although not a fool-proof technique against keyloggers on its own, this could be used in combination with other techniques.

Non-technological methods

Some keyloggers can be fooled by alternating between typing the login credentials and typing characters somewhere else in the focus window.[8] Similarly, a user can move their cursor using the mouse during typing, causing the logged keystrokes to be in the wrong order e.g. by typing a password beginning with the last letter and then using the mouse to move the cursor for each subsequent letter. Lastly, someone can also use context menus to remove, copy, cut and paste parts of the typed text without using the keyboard.

Another very similar technique utilizes the fact that any selected text portion is replaced by the next key typed. E.g. if the password is "secret", one could type "s", then some dummy keys "asdfsd". Then these dummies could be selected with mouse, and next character from the password "e" is typed, which replaces the dummies "asdfsd".

SET XP AS THE DEFAULT OS

Windows Vista allows you to use multiple operating systems.If Vista is installed as a dual boot with Windows XP, by default Vista would be set as the primary operating system.

However , if you frequently use Windows XP , you can set Windows XP as the default operating system by a simple command:

Click>Start and type”cmd” in the search box

Once a command prompt is displayed, simply type in the command

“bcdedit /default(ntldr)” and press Enter
http://capitalhead.com/img/cmd.png

Windows XP will now be set as your default operating system.

Sunday, January 11, 2009




How to Stop YouTube Videos from Automatically Playing in Firefox

It drives me crazy that YouTube videos start playing automatically. It's especially annoying when i try to download youtube Video using Realone Player .So I went searching for the best method to disable these videos from playing automatically, and came up with three different options that I've listed for you here.

Method 1: Using the StopAutoPlayingAlready Extension

This extension is for people who don't use greasemonkey.
Once you install the extension, you'll notice that the videos on YouTube.com now have the play button.


To install, download the extension to your hard drive, and then drag it to your Firefox Add-ons dialog:

Install StopAutoPlayingAlready Extension for Firefox




Method 2: Using the Youtube Prevent Autoplay Script:

If you love using Greasemonkey you'll probably prefer this method. All you need to do is install the greasemonkey script and it will work exactly as the extension above.

Download Youtube Prevent Autoplay Script from userscripts.org

MOVE YOUR MOUSE POINTER WITH YOUR KEYBOARD



Follow the given steps to activate the keyboard mouse:

  1. To edit this feature, first you should log onto your computer with administrative rights.
  2. To activate this feature, press Alt+Shift+NumLock keys at once and you will receive a small MouseKey box.
  3. To keep MouseKeys on, click on Ok button or click on cancel button to cancel MouseKeys box.
  4. Click on Settings button, if you want to adjust the mouse cursor detail settings.
  5. Here a new dialog box will appear with the title Settings for MouseKeys, now you can manage all mouse settings for example mouse cursor speed, acceleration and some other features.

Now using Numeric keypad, you can move your mouse pointer.

The controls are:

  • 1,2,3,4,6,7,8 and 9 keys are used to move the mouse cursor into different directions.
  • Key 5 is used as mouse click button.
  • Insert key used to hold down mouse button.
  • + Sign used to double click on any object.
  • Delete button used to release the mouse.
  • Click on NumLock button to disable this keyboard mouse feature



Friday, January 9, 2009

SECRETS OF XP



Software Easter Eggs (Definition) - A hidden message or feature in an application. This guide covers the undocumented and hidden features in Windows XP.
All of the following were tested in Win XP Pro only.

Defrag
Secret - Hidden Command Line Switch
Instructions - Go to "Start", "Run" and Type defrag c: -b to defragment the Boot and Application Prefetch information.
Notes - Windows XP will run this automatically every three days or so, during system idle periods. BootVis will evoke this when you run the "Optimize System" function.

There is no need to manually run this unless you wish to immediately optimize a newly installed application's load time.

IExpress
Secret - Hidden Install Creator
Instructions - Go to Start, Run, type iexpress

Notes - IExpress is a technology designed to simplify creation of a setup program. Using the step-by-step IExpress Wizard, you can create self-extracting files that automatically run the setup program contained inside. The setup program can be an .inf file or an executable program.
IExpress technology automatically removes the setup files after installation, saving the user time and frustration.

Netmeeting
Secret - Hidden Internet Conference Application
Instructions - Go to Start, Run, type conf

Notes - Windows XP is the last version of Micr@s@ft Windows to include NetMeeting. NetMeeting delivers a complete Internet conferencing solution for all Windows users with multi-point data conferencing, text chat, whiteboard, and file transfer, as well as point-to-point audio and video.

Notepad
Secret - Create a Log File
Instructions - Launch Notepad, Type .LOG on the first line, and then press Enter to move to the next line. On the File menu, click Save As, type a descriptive name for your file in the File name box, and then click OK. When you next open the file, note that the date and time have been appended to the end of the log, immediately preceding the place where new text can be added. You can use this functionality to automatically add the current date and time to each log entry.

Paint
Secret - Image Trails
Instructions - Open an image and hold down Shift then drag the image around to create an image trail.

Secret - 10x Zoom
Instructions - Open an image and select the magnifying glass icon.
Left-Click exactly on the line below the 8x.

Private Character Editor
Secret - Hidden Font Editor
Instructions - Go to Start, Run, type eudcedit

Notes - You can use Private Character Editor to create unique letters and logos for your font library.

Windows Media Player 6.4
Secret - Hidden Windows Media Player
Instructions - Go to Start, Run, type mplayer2

Notes - Windows Media Player 6.4 (Classic) is installed along with Windows Media Player 7. The only update is that it now supports the latest codecs.

GAME SECRETS

FreeCell
Secret - Instant Win
Instructions - Hold down Ctrl + Shift + F10 during game play. Then you will be asked if you want to Abort, Retry or Ignore. Choose Abort, then move any card to instantly win.

Secret - Hidden Game Modes
Instructions - In the "Game" menu choose "Select Game". Enter -1 or -2 to activate the hidden game modes.


Hearts

Secret - Show All Cards
Instructions - Edit this registry key:
HKEY_CURRENT_USER\Software\Micr@s@ft\Windows\Curre ntVersion\Applets\Hearts and create a new String
value named ZB with a Data value of 42. Start Hearts and Press Ctrl + Alt + Shift + F12 to show all the cards.

Background - This secret is a reference to Douglas Adams' book the Hitch Hiker's Guide to the Galaxy. 'ZB' is the initials of the character Zaphod Beeblebrox, the Galactic President. '42' is the answer to The Ultimate Question Of Life, the Universe and Everything.


Minesweeper
Secret - Reveal Mines
Instructions - Minimize or close all running applications. Launch Minesweeper, then type xyzzy. Next hold down either shift key for one second. Now when you move the mouse cursor over a Minesweeper square you will see a tiny white pixel in the top left corner of your desktop screen.
This pixel will change to black when your mouse moves over a mine. You may need to change you desktop background to a solid color other then white or black to see the pixel.

Secret - Stop Timer
Instructions - Launch Minesweeper and start a game so the timer starts counting, then press the Windows Key + D to show the desktop. Now when you select minesweeper from the taskbar you can continue playing with the timer stopped.


Pinball
Secret - Extra Balls
Instructions - Type 1max at the start of a new ball to get extra balls.

Secret - Gravity Well
Instructions - Type gmax at the start of a new game to activate the Gravity Well.

Secret - Instant Promotion
Instructions - Type rmax at the start of a new game to go up in ranks.

Secret - Skill Shot
Instructions - Launch the ball partially up the chute past the third yellow light bar so it falls back down to get 75,000 points. There are six yellow light bars that are worth a varying amount of points:

First: 15,000 points
Second: 30,000 points
Third: 75,000 points
Fourth: 30,000 points
Fifth: 15,000 points
Sixth: 7,500 points

Secret - Test Mode
Instructions - Type hidden test at the start of a new ball to activate Test Mode. No notification will be given that this is activated but you can now left-click the mouse button and drag the ball around. While in test mode press the following keys for more secrets:

H - Get a 1,000,000,000 High Score
M - Shows the amount of system memory
R - Increases your rank in game
Y - Shows the Frames/sec rate

Secret - Unlimited Balls
Instructions - Type bmax at the start of a new ball. No notification will be given that this is activated but when a ball is lost a new ball will appear from the yellow wormhole indefinitely. Once this is activated you will be unable to activate other secrets without restarting the game.

Solitaire
Secret - Instant Win
Instructions - Press Alt + Shift + 2 during game play to instantly win.

Secret - Draw single cards in a Draw Three game
Instructions - Hold down CTRL + ALT + SHIFT while drawing a new card. Instead of drawing three cards you will only draw one.

OS SECRETS

Add/Remove
Secret - Hidden Uninstall Options
Instructions - Warning: Proceed at your own risk! Browse to
C:\Windows\inf\ and make a backup copy of sysoc.inf. Then open the original file
C:\Windows\inf\sysoc.inf in notepad. Go to "Edit" and select "Replace".
In "Find what:" type ,hide and in "Replace with:" type , then select
"Replace All", save and close the file. Go to the "Control Panel",
"Add/Remove", select "Add/Remove Windows Components". You will now see many more Windows components to uninstall. Do not remove anything with no label or that you do not recognize or fully understand what it does. Doing so can break certain functionality in Windows.

Control Panel
Secret - Hidden Control Panel Extensions
Instructions - Download and install TweakUI, launch, go to "Control Panel" and check any item not selected, then "Apply" and "OK". You will now see the hidden control panel extensions.

Device Manager
Secret - Hidden Devices
Instructions - Go to the "Control Panel", "System" icon, "Hardware" tab and select "Device Manager". Select "View" and Show hidden devices.

Secret - Phantom Devices
Instructions - Go to "Start", "Programs", "Accessories" and select "Command Prompt". At the command prompt, type "set
devmgr_show_nonpresent_devices=1" and press Enter. At the command prompt, type "start devmgmt.msc" and press Enter. Select "View" and Show hidden devices. You can see devices that are not connected to the computer. - Source

Notes - When you close the command prompt window, Windows clears the "devmgr_show_nonpresent_devices=1" variable that you set and prevents phantom devices from being displayed when you select "Show hidden devices".

Music
Secret - Music from the Installer
Instructions - Browse to C:\Windows\system32\oobe\images\title.wma and play.

Notes - "OOBE" stands for "Out-of-Box Experience".

Shutdown
Secret - Display Hibernate Option on the Shut Down dialog
Instructions - Go to "Start", "Turn Off Computer..." and press either Shift key to change the "Stand By" button to "Hibernate"

How to remove Newfolder.exe virus


How to remove Newfolder.exe virus

Trouble:

One of our readers reported about a virus in his pen drive,his drive is infected with Newfolder.exe virus. He has some very crucial data on the drive, so he cannot format the drive.

What is NewFolder.exe virus?



New Folder.exe virus disables task manager, disables registry editor, disables folder options, and disables run option from start menu. Virus creates exe files like the icon of folders with the same name as the name of the folder, it also consumes more than 50 % of your processor usage so slows down your computer.

Let’s see how we can remove this virus without formatting the drive.

Fix:
In order to remove the newfolder.exe virus you can use two types of tools, again there is a manual procedure also but the tools mentioned below are much better:

Tools to remove Newfolder.exe virus



1. Newfolder virus removal tool by Muhammad Abdullah. Download it
from here


2. Newfolder Virus removal tool by Albin. Download it from here






Both of these are executable files, download any one of them and run the file by double-clicking on it, it will clean the virus.


If you find some problem in using any of the above mentioned tools. Please let us know through comments.

Manual Method:



You need delete a file named svichossst.exe where ever you find this file on your system

Remove the following keys from registry
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System]
“@”=[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]
“Yahoo Messengger”=

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
“Shell”=”Explorer.exe

I hope at least one of the above method given above will help you fix the trouble.

GOOGLE DESKTOP


Google Desktop Search is how our brains would work if we had photographic memories. It's a desktop search application that provides full text search over your email, computer files, chats, and the web pages you've viewed. By making your computer searchable, Google Desktop Search puts your information easily within your reach and frees you from having to manually organize your files, emails, and bookmarks.

After downloading Google Desktop Search, you can search your personal items as easily as you search the Internet using Google. Unlike traditional computer search software that updates once a day, Google Desktop Search updates continually for most file types, so that when you receive a new email in Outlook, for example, you can search for it within seconds. The index of searchable information created by Desktop Search is stored on your own computer.

In addition to basic search, Google Desktop Search introduces new ways to access relevant and timely information. When you view a web page in Internet Explorer, Google Desktop Search "caches" or stores its content so that you can later look at that same version of the page, even if its live content has changed or you're offline. Google Desktop Search organizes email search results into conversations, so that all email messages in the same thread are grouped into a single search result.

Download Now (1.9MB)
Tested spyware free

Thursday, January 1, 2009

FLV PLAYER



FLV Player is a tool to play Flash FLV and H.264 (MPEG-4) videos with. This utility can come in handy when viewing many FLV and/or H.264 files. The installer comes with optional FLV file-association, so double clicking an FLV file opens and plays the file in FLV Player.

Version 2.0.25 adds 'video-only' mode (press [tab] to hide all FLV Player interface elements, note that you can still drag the video around), volume control with [arrow-up] and [arrow-down] keys, timer toggle (normal and milliseconds). Ability to skip forward with [arrow-right] key has been restored.

Download Now (4.77MB)
Tested spyware free

Wednesday, December 31, 2008

TRANSFORM XP TO VISTA1.2



Bring innovation into your work without buying a new PC or a system. The best freeware safely installed. So if you want to make your computer get a modern Vista look, this is the perfect solution. The package includes: Yahoo widgets - a lot of small and beautiful assistants. Anything you could only imagine on your desktop - from PC temperature to mini games; Vista Theme - a special theme developed by Microsoft which transforms Windows XP into Windows Vista; Vista Start Menu - modifies not only menu's skin but also its functionality. Learn how a convenient menu looks like. The items of the package 1.2 may include unspecified updates, enhancements, or bug fixes.


Download Now (10.94MB)
Tested spyware free

STYLE XP-3.18



How sleek is your desktop? Style XP can unleash the full potential of your Windows XP desktop by allowing you to download and install XP themes. Customize your XP interface to look like a Mac, or view hundreds of other custom skins. Style XP can modify backgrounds, themes, and logons. Style XP is 100 percent application compatible.

Version 3.18 may include unspecified updates, enhancements, or bug fixes.

Download Now (18.52MB)




Spyware Doctor is an advanced adware and spyware removal utility that detects and cleans thousands of potential spyware, ad ware, trojans, keyloggers, spy ware cookies, trackware, spybots and other malware from your PC. Protect your privacy and computing habits from prying eyes.

Download Now (12.97MB)
Tested spyware free


FOR FULL VERSION CONTACT ME & GET THE SERIAL

Tuesday, December 30, 2008

YOUTUBE DOWNLOADER


It's software that allows you to download videos from YouTube and many others and convert them to other video formats. The program is easy to use, just specify the URL for the video you want to download and click the Ok! It also allows you to convert downloaded videos for iPod, iPhone, PSP, Cell Phone, Windows Media, XVid and MP3. Allows you to access YouTube videos for which you need to be 18+ years of age. Now, plays videos downloaded.

Version 2.1.7 now supports most of your favorite video sites including Yahoo Video and Daily Motion.

Download Now (5.38MB)
Tested spyware free

SPYBOT SEARCH & DESTROY


Spybot - Search & Destroy can detect and remove a multitude of adware files and modules from your computer. Spybot also can clean program and Web-usage tracks from your system, which is especially useful if you share your computer. Modules chosen for removal can be sent directly to the included file shredder, ensuring complete elimination from your system. For advanced users, it allows you to fix Registry inconsistencies related to adware and to malicious program installations. The handy online-update feature ensures that Spybot always has the most current and complete listings of adware, dialers, and other uninvited system residents.

Version 1.6 features improved speed for on-demand scans, support for a dozen different browsers, and easier on-access use.

Download Now (14.38MB)
Tested spyware free