UNIX Vs LINUX
UNIX:
Unix is a popular operating system.There are two "main" flavors, BSD, and System V. System V is what AT&T developed in 1969, nurtured and sold to people. BSD is the unix that came from Berkeley University.We people have generally interaction with System V unix.
It is a multi-processing, multi-user, family of operating systems that run on a variety of architechtures. UNIX allows more than one user to access a computer system at the same time.
It is the OS in which kernel interacts directly with the hardware.kernal is consider to be heart of this os.In this Operating system everything is considered as a file,provides greater security.
Ex: posix
LINUX:
Linux is an Operating system which use unix as its base and gives further more facilities and applications.Linux was first released by its inventor Linus Torvalds in 1991. Combining the Linux kernel with the GNU software forms the basis of the operating system family generally known as 'Linux'.
Merely speeking GUI is made in linux having unix as its core.Differnent organizations used the UNIX kernal and added their own essence to form their own version of linux.
Ex: Redhat, Fedora, Solaris,AIX,Ubuntu,Susee, Mandrake . .
Both UNIX and LINUX are Open source
Saturday, December 27, 2008
HACKING:A PATH:- DOS ATTACK
Definition:
HACKING:A PATH:- DOS ATTACK
Such an attack clogs up so much bandwidth on the target system that it cannot serve even legitimate users.
Working:
ATTACKER-----Infinite Malicious Data-----à VICTIM
Tools:
üPing of Death, SYN Flooding, Teardrop, Smurf, Land [TYPES]
üTrin00, Tribal Flood Network etc [TOOLS]
Steps involved in
DOS Attacks
Ø1.Attacker---------Infinite/ Malicious Data--à Target Network
●
2.Target Network gets choked or cannot handle the malicious data and hence crashes.
●
3.As a result, even legitimate clients/ people cannot connect to the target network.
●
4.This results in loss of revenue, disrupt in services, inconvenience, customer dissatisfaction and many other problems.
PING OF DEATH
Ø
ØThe maximum packet size allowed to be transmitted by TCP\IP on a network is 65 536 bytes.
Ø
ØIn the Ping of Death Attack, a packet having a size greater than this maximum size allowed by TCP\IP, is sent to the target system.
Ø
ØAs soon as the target system receives a packet exceeding the allowable size, then it crashes, reboots or hangs.
Ø
ØThis attack can easily be executed by the ‘ping’ command as follows:
Ø
ping -l 65540 hostname
SMURF ATTACKS
Ø
ØIn SMURF Attacks, a huge number of Ping Requests are sent to the broadcast address of the target network, using Spoofed IP Addresses from within the target network.
Ø
ØDue to infinite loops thus generated and due to the large number of Ping Requests, the target network will crash, restart or hang up.
ØCountermeasure
Filter out all incoming packets which either:
ü Has its source address same as any internal system.
ü Has its target address as the broadcast address. There is NO reason why external systems need to send data to the broadcast address.
LAND ATTACKS
Ø
ØSome implementations of TCP/IP are vulnerable to packets which originate and terminate from the same IP Address.
Ø
ØHence, in a LAND attack, the attacker sends infinite packets to the victim system from the victim system itself (Spoofing!).
Ø
ØThe same source and target address and port number crashes the victim system.
Ø
ØCountermeasure:
Ø
• Simple filtering should solve the problem.
BUSINESS THREATS
•All services unusable.
•
•All users Disconnected.
•
•Loss of revenue.
•
•Deadlines can be missed.
•
•Unnecessary Inefficiency and Downtime.
•
•Share Values go down. Customer Dissatisfaction.
COUNTERMEASURES
§
§Separate or compartmentalize critical services.
§Buy more bandwidth than normally required to count for sudden attacks.
§Filter out USELESS/MALICIOUS traffic as early as possible.
§Disable publicly accessible services.
§Balance traffic load on a set of servers.
§Regular monitoring and working closely with ISP will always help!
§Patch systems regularly.
§IPSec provides proper verification and authentication in the IP protocol.
§Use scanning tools to detect and remove DOS tools.
HACKING:A PATH:- DOS ATTACK
Such an attack clogs up so much bandwidth on the target system that it cannot serve even legitimate users.
Working:
ATTACKER-----Infinite Malicious Data-----à VICTIM
Tools:
üPing of Death, SYN Flooding, Teardrop, Smurf, Land [TYPES]
üTrin00, Tribal Flood Network etc [TOOLS]
Steps involved in
DOS Attacks
Ø1.Attacker---------Infinite/ Malicious Data--à Target Network
●
2.Target Network gets choked or cannot handle the malicious data and hence crashes.
●
3.As a result, even legitimate clients/ people cannot connect to the target network.
●
4.This results in loss of revenue, disrupt in services, inconvenience, customer dissatisfaction and many other problems.
PING OF DEATH
Ø
ØThe maximum packet size allowed to be transmitted by TCP\IP on a network is 65 536 bytes.
Ø
ØIn the Ping of Death Attack, a packet having a size greater than this maximum size allowed by TCP\IP, is sent to the target system.
Ø
ØAs soon as the target system receives a packet exceeding the allowable size, then it crashes, reboots or hangs.
Ø
ØThis attack can easily be executed by the ‘ping’ command as follows:
Ø
ping -l 65540 hostname
SMURF ATTACKS
Ø
ØIn SMURF Attacks, a huge number of Ping Requests are sent to the broadcast address of the target network, using Spoofed IP Addresses from within the target network.
Ø
ØDue to infinite loops thus generated and due to the large number of Ping Requests, the target network will crash, restart or hang up.
ØCountermeasure
Filter out all incoming packets which either:
ü Has its source address same as any internal system.
ü Has its target address as the broadcast address. There is NO reason why external systems need to send data to the broadcast address.
LAND ATTACKS
Ø
ØSome implementations of TCP/IP are vulnerable to packets which originate and terminate from the same IP Address.
Ø
ØHence, in a LAND attack, the attacker sends infinite packets to the victim system from the victim system itself (Spoofing!).
Ø
ØThe same source and target address and port number crashes the victim system.
Ø
ØCountermeasure:
Ø
• Simple filtering should solve the problem.
BUSINESS THREATS
•All services unusable.
•
•All users Disconnected.
•
•Loss of revenue.
•
•Deadlines can be missed.
•
•Unnecessary Inefficiency and Downtime.
•
•Share Values go down. Customer Dissatisfaction.
COUNTERMEASURES
§
§Separate or compartmentalize critical services.
§Buy more bandwidth than normally required to count for sudden attacks.
§Filter out USELESS/MALICIOUS traffic as early as possible.
§Disable publicly accessible services.
§Balance traffic load on a set of servers.
§Regular monitoring and working closely with ISP will always help!
§Patch systems regularly.
§IPSec provides proper verification and authentication in the IP protocol.
§Use scanning tools to detect and remove DOS tools.
TYPES OF WINDOWS VIRUS
TYPES OF WINDOWS VIRUS-
Its really a matter of concern that all virus,trojans,worm,malware,spyware .......and many more have been developed for WINDOWS operating System.No threat for unix,or linux and Macintosh.So here have a look of different types of virus...........
AdTool.*
AdvWare.*
AdWare.*------------------large classification
Backdoor.*(Trojan)-----------largely used for hacking purpose
Badjoke.*
BadTrans.worm
B02K.*
Bolanzo
BOrifice
Caw
CIH
Client.*
Constructor.*
CrackTool.HotHook
Damage.small
danton
DDoS
Dialer.*
Downloader.*
fraudTool.*
HackTool.*
Hoax.*
I-Worm.*
PornDialer.*
PSWTool.*
Rootkit.*
Trojan.*
Trojandownloader.*
TrojanDropper.*
TrojanExpl.Agent.bo
TrojanFlood.Ideknet.e
TrojanGameThief.*
TrojanProxy.*
TrojanPSW.*
TrojanSpy.*
TrojanSpy.zboot.*
W32.*- ----------------- most found virus
Worm.*
Worms.AutoRun.ml
YKRat.Backdoor
Renaming The Start Button:
Renaming The Start Button:
To rename the start button, you will need a hex editor.
My preference is UltraEdit
Copy the \windows\explore.exe file to a new name (e.g. explorer_1.exe)
With the hex editor, open that file and go to offset 412b6
You will see the word start with blanks between each letter
Edit it be any 5 characters or less
Save the file
Boot to DOS
Copy the existing c:\windows\explorer.exe to explorer.org
Copy explorer_1.exe to explorer.exe
You will also need to replace the explorer.exe in the c:\windows\system32\dllcache file as well with the new one.
Note: If the partition is NTFS and you can't access the files from DOS:
Start Regedit
Go to HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon.
Change the value of Shell from Explorer.exe to explorer_1.exe
To rename the start button, you will need a hex editor.
My preference is UltraEdit
Copy the \windows\explore.exe file to a new name (e.g. explorer_1.exe)
With the hex editor, open that file and go to offset 412b6
You will see the word start with blanks between each letter
Edit it be any 5 characters or less
Save the file
Boot to DOS
Copy the existing c:\windows\explorer.exe to explorer.org
Copy explorer_1.exe to explorer.exe
You will also need to replace the explorer.exe in the c:\windows\system32\dllcache file as well with the new one.
Note: If the partition is NTFS and you can't access the files from DOS:
Start Regedit
Go to HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon.
Change the value of Shell from Explorer.exe to explorer_1.exe
RESTRICTIONS IN WIN XP
RESTRICTIONS IN WIN XP
If you want to make restrictions to what users can do or use on their computer without
having to run Poledit, you can edit the Registry. You can add and delete Windows
features in this Key shown below.
Zero is Off and the value 1 is On. Example: to Save Windows settings add or modify
the value name NoSaveSettings to 0, if set to1 Windows will not save settings. And
NoDeletePrinter set to 1 will prevent the user from deleting a printer.
The same key shows up at:
HKEY_USERS\(yourprofilename)\Software\Microsoft\Windows\CurrentVersion\Poli
cies\Explorer so change it there also if you are using different profiles.
1.Open RegEdit
2.Go to HKEY_CURRENT_USER\Software\Microsoft\CurrentVersion\Policies
3.Go to the Explorer Key (Additional keys that can be created under Policies are
System, Explorer, Network and WinOldApp )
4.You can then add DWORD or binary values set to 1 in the appropriate keys for ON
and 0 for off.
NoDeletePrinter - Disables Deletion of Printers
NoAddPrinter - Disables Addition of Printers
NoRun - Disables Run Command
NoSetFolders - Removes Folders from Settings on Start Menu
NoSetTaskbar - Removes Taskbar from Settings on Start Menu
NoFind - Removes the Find Command
NoDrives - Hides Drives in My Computers
NoNetHood - Hides the Network Neighborhood
NoDesktop - Hides all icons on the Desktop
NoClose - Disables Shutdown
NoSaveSettings - Don't save settings on exit
DisableRegistryTools - Disable Registry Editing Tools
NoRecentDocsMenu - Hides the Documents shortcut at the Start button
NoRecentDocsHistory- Clears history of Documents
NoFileMenu _ Hides the Files Menu in Explorer
NoActiveDesktop - No Active Desktop
NoActiveDesktopChanges- No changes allowed
NoInternetIcon - No Internet Explorer Icon on the Desktop
NoFavoritesMenu - Hides the Favorites menu
NoChangeStartMenu _ Disables changes to the Start Menu
NoFolderOptions _ Hides the Folder Options in the Explorer
ClearRecentDocsOnExit - Empty the recent Docs folder on reboot
NoLogoff - Hides the Log Off .... in the Start Menu
NoViewOnDrive – Restrict a drive to open
And here are a few more you can play with
ShowInfoTip
NoTrayContextMenu
NoStartMenuSubFolders
NoWindowsUpdate
NoViewContextMenu
EnforceShellExtensionSecurity
LinkResolveIgnoreLinkInfo
NoDriveTypeAutoRun
NoStartBanner
NoSetActiveDesktop
EditLevel
NoNetConnectDisconnect
RestrictRun - Disables all exe programs except those listed in the RestrictRun subkey
This key has many other available keys, there is one to even hide the taskbar, one to
hide the control panel and more. I'm not telling you how, as someone may want to
play a trick on you. The policies key has a great deal of control over how and what
program can run and how one can access what feature.
In the System key you can enter:
NoDispCPL - Disable Display Control Panel
NoDispBackgroundPage - Hide Background Page
NoDispScrSavPage - Hide Screen Saver Page
NoDispAppearancePage - Hide Appearance Page
NoDispSettingsPage - Hide Settings Page
NoSecCPL - Disable Password Control Panel
NoPwdPage - Hide Password Change Page
NoAdminPage - Hide Remote Administration Page
NoProfilePage - Hide User Profiles Page
NoDevMgrPage - Hide Device Manager Page
NoConfigPage - Hide Hardware Profiles Page
NoFileSysPage - Hide File System Button
NoVirtMemPage - Hide Virtual Memory Button
In the Network key you can enter:
NoNetSetup - Disable the Network Control Panel
NoNetSetupIDPage - Hide Identification Page
NoNetSetupSecurityPage - Hide Access Control Page
NoFileSharingControl - Disable File Sharing Controls
NoPrintSharing - Disable Print Sharing Controls
In the WinOldApp key you can enter:
Disabled - Disable MS-DOS Prompt
NoRealMode - Disables Single-Mode MS-DOS
Hidden Programs In Windows Xp
1- Private Character Editor
This program is for designing icons and Characters(Alphapet)
Click :start
Then :run
type :EUDCEDIT
.................................................................................................................................................
2- iExpress
This Program is for conerting your files to EXCUTABLE files
Click : start
Then : run
type : iexpress
.................................................................................................................................................
3-Disk Cleanup
This program used for cleaning harddisk to offer space
Click : start
Then : run
type : cleanmgr
.................................................................................................................................................
4-Dr Watson
This program Is for repairing problems in Windows
Click : start
Then : run
type : drwtsn32
.................................................................................................................................................
5-Windows Media Player 5.1
Opens the old media player
Click : start
Then : run
type : mplay32
.................................................................................................................................................
Program ............. CODE
__________ __________
Character Map = charmap
DirectX diagnosis = dxdiag
Object Packager = packager
System Monitor = perfmon
Program Manager = progman
Remote Access phone book = rasphone
Registry Editor = regedt32
File siganture verification tool = sigverif
Volume Contro = sndvol32
System Configuration Editor = sysedit
Syskey = syskey
Microsoft Telnet Client = telnet
XP Secrets...
Defrag
Secret - Hidden Command Line Switch
Instructions - Go to "Start", "Run" and Type defrag c: -b to defragment the Boot and Application Prefetch information.
Notes - Windows XP will run this automatically every three days or so, during system idle periods. BootVis will evoke this when you run the "Optimize System" function. There is no need to manually run this unless you wish to immediately optimize a newly installed application's load time.
For Paint
Secret - Image Trails
Instructions - Open an image and hold down Shift then drag the image around to create an image trail.
Secret - 10x Zoom
Instructions - Open an image and select the magnifying glass icon. Left-Click exactly on the line below the 8x.
The above 2 tricks works.. and i have checked...
Free Cell Cheat Code:
Secret - Instant Win
Instructions - Hold down Ctrl + Shift + F10 during game play. Then you will be asked if you want to Abort, Retry or Ignore. Choose Abort, then move any card to instantly win.
Secret - Hidden Game Modes
Instructions - In the "Game" menu choose "Select Game". Enter -1 or -2 to activate the hidden game modes.
Solitaire Cheat Code:
Secret - Instant Win
Instructions - Press Alt + Shift + 2 during game play to instantly win.
Secret - Draw single cards in a Draw Three game
Instructions - Hold down CTRL + ALT + SHIFT while drawing a new card. Instead of drawing three cards you will only draw one. delete
If you want to make restrictions to what users can do or use on their computer without
having to run Poledit, you can edit the Registry. You can add and delete Windows
features in this Key shown below.
Zero is Off and the value 1 is On. Example: to Save Windows settings add or modify
the value name NoSaveSettings to 0, if set to1 Windows will not save settings. And
NoDeletePrinter set to 1 will prevent the user from deleting a printer.
The same key shows up at:
HKEY_USERS\(yourprofilename)\Software\Microsoft\Windows\CurrentVersion\Poli
cies\Explorer so change it there also if you are using different profiles.
1.Open RegEdit
2.Go to HKEY_CURRENT_USER\Software\Microsoft\CurrentVersion\Policies
3.Go to the Explorer Key (Additional keys that can be created under Policies are
System, Explorer, Network and WinOldApp )
4.You can then add DWORD or binary values set to 1 in the appropriate keys for ON
and 0 for off.
NoDeletePrinter - Disables Deletion of Printers
NoAddPrinter - Disables Addition of Printers
NoRun - Disables Run Command
NoSetFolders - Removes Folders from Settings on Start Menu
NoSetTaskbar - Removes Taskbar from Settings on Start Menu
NoFind - Removes the Find Command
NoDrives - Hides Drives in My Computers
NoNetHood - Hides the Network Neighborhood
NoDesktop - Hides all icons on the Desktop
NoClose - Disables Shutdown
NoSaveSettings - Don't save settings on exit
DisableRegistryTools - Disable Registry Editing Tools
NoRecentDocsMenu - Hides the Documents shortcut at the Start button
NoRecentDocsHistory- Clears history of Documents
NoFileMenu _ Hides the Files Menu in Explorer
NoActiveDesktop - No Active Desktop
NoActiveDesktopChanges- No changes allowed
NoInternetIcon - No Internet Explorer Icon on the Desktop
NoFavoritesMenu - Hides the Favorites menu
NoChangeStartMenu _ Disables changes to the Start Menu
NoFolderOptions _ Hides the Folder Options in the Explorer
ClearRecentDocsOnExit - Empty the recent Docs folder on reboot
NoLogoff - Hides the Log Off .... in the Start Menu
NoViewOnDrive – Restrict a drive to open
And here are a few more you can play with
ShowInfoTip
NoTrayContextMenu
NoStartMenuSubFolders
NoWindowsUpdate
NoViewContextMenu
EnforceShellExtensionSecurity
LinkResolveIgnoreLinkInfo
NoDriveTypeAutoRun
NoStartBanner
NoSetActiveDesktop
EditLevel
NoNetConnectDisconnect
RestrictRun - Disables all exe programs except those listed in the RestrictRun subkey
This key has many other available keys, there is one to even hide the taskbar, one to
hide the control panel and more. I'm not telling you how, as someone may want to
play a trick on you. The policies key has a great deal of control over how and what
program can run and how one can access what feature.
In the System key you can enter:
NoDispCPL - Disable Display Control Panel
NoDispBackgroundPage - Hide Background Page
NoDispScrSavPage - Hide Screen Saver Page
NoDispAppearancePage - Hide Appearance Page
NoDispSettingsPage - Hide Settings Page
NoSecCPL - Disable Password Control Panel
NoPwdPage - Hide Password Change Page
NoAdminPage - Hide Remote Administration Page
NoProfilePage - Hide User Profiles Page
NoDevMgrPage - Hide Device Manager Page
NoConfigPage - Hide Hardware Profiles Page
NoFileSysPage - Hide File System Button
NoVirtMemPage - Hide Virtual Memory Button
In the Network key you can enter:
NoNetSetup - Disable the Network Control Panel
NoNetSetupIDPage - Hide Identification Page
NoNetSetupSecurityPage - Hide Access Control Page
NoFileSharingControl - Disable File Sharing Controls
NoPrintSharing - Disable Print Sharing Controls
In the WinOldApp key you can enter:
Disabled - Disable MS-DOS Prompt
NoRealMode - Disables Single-Mode MS-DOS
Hidden Programs In Windows Xp
1- Private Character Editor
This program is for designing icons and Characters(Alphapet)
Click :start
Then :run
type :EUDCEDIT
.................................................................................................................................................
2- iExpress
This Program is for conerting your files to EXCUTABLE files
Click : start
Then : run
type : iexpress
.................................................................................................................................................
3-Disk Cleanup
This program used for cleaning harddisk to offer space
Click : start
Then : run
type : cleanmgr
.................................................................................................................................................
4-Dr Watson
This program Is for repairing problems in Windows
Click : start
Then : run
type : drwtsn32
.................................................................................................................................................
5-Windows Media Player 5.1
Opens the old media player
Click : start
Then : run
type : mplay32
.................................................................................................................................................
Program ............. CODE
__________ __________
Character Map = charmap
DirectX diagnosis = dxdiag
Object Packager = packager
System Monitor = perfmon
Program Manager = progman
Remote Access phone book = rasphone
Registry Editor = regedt32
File siganture verification tool = sigverif
Volume Contro = sndvol32
System Configuration Editor = sysedit
Syskey = syskey
Microsoft Telnet Client = telnet
XP Secrets...
Defrag
Secret - Hidden Command Line Switch
Instructions - Go to "Start", "Run" and Type defrag c: -b to defragment the Boot and Application Prefetch information.
Notes - Windows XP will run this automatically every three days or so, during system idle periods. BootVis will evoke this when you run the "Optimize System" function. There is no need to manually run this unless you wish to immediately optimize a newly installed application's load time.
For Paint
Secret - Image Trails
Instructions - Open an image and hold down Shift then drag the image around to create an image trail.
Secret - 10x Zoom
Instructions - Open an image and select the magnifying glass icon. Left-Click exactly on the line below the 8x.
The above 2 tricks works.. and i have checked...
Free Cell Cheat Code:
Secret - Instant Win
Instructions - Hold down Ctrl + Shift + F10 during game play. Then you will be asked if you want to Abort, Retry or Ignore. Choose Abort, then move any card to instantly win.
Secret - Hidden Game Modes
Instructions - In the "Game" menu choose "Select Game". Enter -1 or -2 to activate the hidden game modes.
Solitaire Cheat Code:
Secret - Instant Win
Instructions - Press Alt + Shift + 2 during game play to instantly win.
Secret - Draw single cards in a Draw Three game
Instructions - Hold down CTRL + ALT + SHIFT while drawing a new card. Instead of drawing three cards you will only draw one. delete
XP HIDDEN SECRATES:
XP HIDDEN SECRATES:
Defrag
Secret - Hidden Command Line Switch
Instructions - Go to "Start", "Run" and Type defrag c: -b to defragment the Boot and Application Prefetch information. Similar to what BootVis invokes.
Paint
Secret - Image Trails
Instructions - Open an image and hold down Shift then drag the image around to create an image trail.
Secret - 10x Zoom
Instructions - Open an image and select the magnifying glass icon. Left-Click exactly on the line below the 8x.
Game Secrets
FreeCell
Secret - Instant Win
Instructions - Hold down Ctrl + Shift + F10 during game play. Then you will be asked if you want to Abort, Retry or Ignore. Choose Abort, then move any card to instantly win.
Secret - Hidden Game Modes
Instructions - In the "Game" menu choose "Select Game". Enter -1 or -2 to activate the hidden game modes.
Minesweeper
Secret - Reveal Mines
Instructions - Minimize or close all running applications. Launch Minesweeper, then type xyzzy. Next hold down either shift key for one second. Now when you move the mouse cursor over a Minesweeper square you will see a tiny white pixel in the top left corner of your desktop screen. This pixel will change to black when your mouse moves over a mine. You may need to change you desktop background to a solid color other then white or black to see the pixel.
Pinball
Secret - Extra Balls
Instructions - Type 1max at the start of a new ball to get extra balls.
Secret - Gravity Well
Instructions - Type gmax at the start of a new game to activate the Gravity Well.
Secret - Instant Promotion
Instructions - Type rmax at the start of a new game to go up in ranks.
Secret - Skill Shot
Instructions - Launch the ball partially up the chute past the third yellow light bar so it falls back down to get 75,000 points. There are six yellow light bars that are worth a varying amount of points:
First: 15,000 points
Second: 30,000 points
Third: 75,000 points
Fourth: 30,000 points
Fifth: 15,000 points
Sixth: 7,500 points
Secret - Test Mode
Instructions - Type hidden test at the start of a new ball to activate Test Mode. No notification will be given that this is activated but you can now left-click the mouse button and drag the ball around.
Secret - Unlimited Balls
Instructions - Type bmax at the start of a new ball. No notification will be given that this is activated but when a ball is lost a new ball will appear from the yellow wormhole indefinitely. Once this is activated you will be unable to activate other secrets without restarting the game.
Solitaire
Secret - Instant Win
Instructions - Press Alt + Shift + 2 during game play to instantly win.
Secret - Draw single cards in a Draw Three game
Instructions - Hold down CTRL + ALT + SHIFT while drawing a new card. Instead of drawing three cards you will only draw one.
OS Secrets
Add/Remove
Secret - Hidden Uninstall Options
Instructions - Warning: Proceed at your own risk! Browse to C:\Windows\inf\ and make a backup copy of sysoc.inf. Then open the original file C:\Windows\inf\sysoc.inf in notepad. Go to "Edit" and select "Replace". In "Find what:" type ,hide and in "Replace with:" type , then select "Replace All", save and close the file. Go to the control panel, "Add/Remove", select "Add/Remove Windows Components". You will now see many more Windows components to uninstall. Do not remove anything with no label or that you do not recognize or fully understand what it does. Doing so can break certain functionality in Windows.
Control Panel
Secret - Hidden Control Panel Extensions
Instructions - Download and install TweakUI, launch, go to "Control Panel" and check any item not selected, then "Apply" and "OK". You will now see the hidden control panel extensions.
Device Manager
Secret - Hidden Devices
Instructions - Go to the control panel, "System" icon, "Hardware" tab and select "Device Manager". Select View and Show hidden devices.
Music
Secret - Music from the Installer
Instructions - Browse to C:\Windows\system32\oobe\images\title.wma and play.
Shutdown
Secret - Display Hibernate Option on the Shut Down dialog
Instructions - Go to "Start", "Turn Off Computer..." and press either Shift key to change the "Stand By" button to "Hibernate".
Support Tools
Secret - Over 100 Windows XP Support Utilities are on the install CD
Instructions for Pre-SP2 users - If you do not have SP2 installed, put the original Windows XP CD in the CD-ROM Drive, run the D:\Support\Tools\setup.exe
Defrag
Secret - Hidden Command Line Switch
Instructions - Go to "Start", "Run" and Type defrag c: -b to defragment the Boot and Application Prefetch information. Similar to what BootVis invokes.
Paint
Secret - Image Trails
Instructions - Open an image and hold down Shift then drag the image around to create an image trail.
Secret - 10x Zoom
Instructions - Open an image and select the magnifying glass icon. Left-Click exactly on the line below the 8x.
Game Secrets
FreeCell
Secret - Instant Win
Instructions - Hold down Ctrl + Shift + F10 during game play. Then you will be asked if you want to Abort, Retry or Ignore. Choose Abort, then move any card to instantly win.
Secret - Hidden Game Modes
Instructions - In the "Game" menu choose "Select Game". Enter -1 or -2 to activate the hidden game modes.
Minesweeper
Secret - Reveal Mines
Instructions - Minimize or close all running applications. Launch Minesweeper, then type xyzzy. Next hold down either shift key for one second. Now when you move the mouse cursor over a Minesweeper square you will see a tiny white pixel in the top left corner of your desktop screen. This pixel will change to black when your mouse moves over a mine. You may need to change you desktop background to a solid color other then white or black to see the pixel.
Pinball
Secret - Extra Balls
Instructions - Type 1max at the start of a new ball to get extra balls.
Secret - Gravity Well
Instructions - Type gmax at the start of a new game to activate the Gravity Well.
Secret - Instant Promotion
Instructions - Type rmax at the start of a new game to go up in ranks.
Secret - Skill Shot
Instructions - Launch the ball partially up the chute past the third yellow light bar so it falls back down to get 75,000 points. There are six yellow light bars that are worth a varying amount of points:
First: 15,000 points
Second: 30,000 points
Third: 75,000 points
Fourth: 30,000 points
Fifth: 15,000 points
Sixth: 7,500 points
Secret - Test Mode
Instructions - Type hidden test at the start of a new ball to activate Test Mode. No notification will be given that this is activated but you can now left-click the mouse button and drag the ball around.
Secret - Unlimited Balls
Instructions - Type bmax at the start of a new ball. No notification will be given that this is activated but when a ball is lost a new ball will appear from the yellow wormhole indefinitely. Once this is activated you will be unable to activate other secrets without restarting the game.
Solitaire
Secret - Instant Win
Instructions - Press Alt + Shift + 2 during game play to instantly win.
Secret - Draw single cards in a Draw Three game
Instructions - Hold down CTRL + ALT + SHIFT while drawing a new card. Instead of drawing three cards you will only draw one.
OS Secrets
Add/Remove
Secret - Hidden Uninstall Options
Instructions - Warning: Proceed at your own risk! Browse to C:\Windows\inf\ and make a backup copy of sysoc.inf. Then open the original file C:\Windows\inf\sysoc.inf in notepad. Go to "Edit" and select "Replace". In "Find what:" type ,hide and in "Replace with:" type , then select "Replace All", save and close the file. Go to the control panel, "Add/Remove", select "Add/Remove Windows Components". You will now see many more Windows components to uninstall. Do not remove anything with no label or that you do not recognize or fully understand what it does. Doing so can break certain functionality in Windows.
Control Panel
Secret - Hidden Control Panel Extensions
Instructions - Download and install TweakUI, launch, go to "Control Panel" and check any item not selected, then "Apply" and "OK". You will now see the hidden control panel extensions.
Device Manager
Secret - Hidden Devices
Instructions - Go to the control panel, "System" icon, "Hardware" tab and select "Device Manager". Select View and Show hidden devices.
Music
Secret - Music from the Installer
Instructions - Browse to C:\Windows\system32\oobe\images\title.wma and play.
Shutdown
Secret - Display Hibernate Option on the Shut Down dialog
Instructions - Go to "Start", "Turn Off Computer..." and press either Shift key to change the "Stand By" button to "Hibernate".
Support Tools
Secret - Over 100 Windows XP Support Utilities are on the install CD
Instructions for Pre-SP2 users - If you do not have SP2 installed, put the original Windows XP CD in the CD-ROM Drive, run the D:\Support\Tools\setup.exe
Books On Hacking
Books On Hacking
Code:
17. [ FLASH ] rues on IBM AIX
http://video.antichat.net/file17.html
Code:
18. [ FLASH ] sequential of rues ispravlenym eksploytom
http://video.antichat.net/file18.html
Code:
19. Is utilized short hyphen. We make no invisible.
http://video.antichat.net/file19.html
Code:
20. Vulnerability http://www.chatmoscow.ru
http://video.antichat.net/file20.html
Code:
21. IRC. Mockery above Slader-Non
http://video.antichat.net/file21.html
Code:
22. Vulnerabilities SetccMS (XSS)
http://video.antichat.net/file22.html
Code:
23. Installation Apache, Php, Perl, Mysql to localhost
http://video.antichat.net/file23.html
Code:
24. Php- injection in the script of news CuteNews v1.3.1
http://video.antichat.net/file24.html
Code:
25. Method of the interpretation of khesha IPB 2..x and breaking the forum
http://video.antichat.net/file25.html
Code:
26. Breaking Invision Power Board sploytom
http://video.antichat.net/file26.html
Code:
27. New vulnerability PunBB
http://video.antichat.net/file27.html
Code:
28. cuz uze google'n'yandex before askin ' stupid questions %)
http://video.antichat.net/file28.html
Code:
29. WWWThreads Bug
http://video.antichat.net/file29.html
Code:
30. Breaking phpBB 2.0.15 new sploytom
http://video.antichat.net/file30.html
Code:
31. Active XSS in LiveJournal.com
http://video.antichat.net/file31.html
Code:
32. Installation of proxy to unix the machine
http://video.antichat.net/file32.html
Code:
33. XSS in phpBB with use phpNuke
http://video.antichat.net/file33.html
Code:
34. Idea of defeysa of the site through the search demands!
http://video.antichat.net/file34.html
Code:
35. Defeys of the site through the vulnerability in PunBB (php include)
http://video.antichat.net/file35.html
Code:
36. Breaking OF LARGE BROTHER - tntbrat.ru. SQL - injection.
http://video.antichat.net/file36.html
Code:
37. Breaking hack-info.net through PHP injection and GIF the file
http://video.antichat.net/file37.html
Code:
38. Breaking of the mailbox through the holes on the server
http://video.antichat.net/file38.html
Code:
39. SQL- Eng. in IPB 1. *, 2. *. Obtaining khesha of admina
http://video.antichat.net/file39.html
Code:
40. History of the breaking of one site
http://video.antichat.net/file40.html
Code:
41. XSS in MercuryBoard. New.
http://video.antichat.net/file41.html
Code:
42. Vulnerability IkonBoard. Reading it is file
http://video.antichat.net/file42.html
Code:
43. Error of khostera in tuning of system.
http://video.antichat.net/file43.html
Code:
44. Obtaining administrative privelegiy in paBugs
http://video.antichat.net/file44.html
Code:
45. Vulnerability phpBB in module downloads.php
http://video.antichat.net/file45.html
Code:
46. XSS in many search with- swing. It is in detail.
http://video.antichat.net/file46.html
Code:
47. Breaking phpBB new sploytom
http://video.antichat.net/file47.html
Code:
48. XSS in PunBB 1..x
http://video.antichat.net/file48.html
Code:
49. XSS in MercuryBoard 1..x
http://video.antichat.net/file49.html
Code:
50. Vulnerability in SR Guestbook
http://video.antichat.net/file50.html
Code:
51. Breaking of box on e-mail.ru (part of 2)
http://video.antichat.net/file51.html
Code:
62. Vulnerability in phpBB 2.0.12 (KEZ)
http://video.antichat.net/file62.html
Code:
63. Vulnerability in phpBB 2.0.12 (max_.pain89)
http://video.antichat.net/file63.html
Code:
64. We obtain seriynik for progi through ArtMoney
http://video.antichat.net/file64.html
Code:
65. We read strange letters on mail.ru through the sessions
http://video.antichat.net/file65.html
Code:
66. SQL injection in LedForums
http://video.antichat.net/file66.html
Code:
67. Example Post- Flood through DenyoLaunch III
http://video.antichat.net/file67.html
Code:
68. SQL injection in search.php in phpBB 2.0.6
http://video.antichat.net/file68.html
Code:
69. SQL injection in MercuryBoard 1.1.0
http://video.antichat.net/file69.html
Code:
70. Study of protection WinRAR 3..0b =)
http://video.antichat.net/file70.html
Code:
71. Second method of the theft of nikov in the chat room
http://video.antichat.net/file71.html
Code:
72. CHAT ROOM. Seizure of nikov.
http://video.antichat.net/file72.html
Code:
73. Presence s/n for WinZIP 8..0b
http://video.antichat.net/file73.html
Code:
74. We make patch for BlueFace (CodeFusion)
http://video.antichat.net/file74.html
Code:
75. We make patch for WinZIP 8..0b (CodeFusion)
http://video.antichat.net/file75.html
Code:
76. We penetrate in strange comp. through Remote Administrator
http://video.antichat.net/file76.html
Code:
77. Pincha no longer catches the antivirus
http://video.antichat.net/file77.html
Code:
78. Survey of bagov in cgi scripts.
http://video.antichat.net/file78.html
Code:
79. Idea of brutoforsa amperesecond through HTTP demands.
http://video.antichat.net/file79.html
Code:
80. As to drive away as'ku. One of the methods.
http://video.antichat.net/file80.html
Code:
81. By vlom with the aid of rAdmin Of brutforsera!
http://video.antichat.net/file81.html
Code:
82. one additional method to skachat' paid mp3 c of site mp3search.ru.
http://video.antichat.net/file82.html
Code:
83. Defeys on the rapid. Bagi on the server. Admin did not advance right on the folders.
http://video.antichat.net/file83.html
Code:
84. Vulnerability of site on cursor runcms
http://video.antichat.net/file84.html
Code:
85. Story about troyane pinch 1.0
http://video.antichat.net/file85.html
Code:
86. The new vulnerability Mybb. XSS works in all browsers.
http://video.antichat.net/file86.html
Code:
87. Breaking IcrediBB (SQL-injection)
http://video.antichat.net/file87.html
Code:
88. Baga in the the guest MPM Guesbook Pro
http://video.antichat.net/file88.html
Code:
89. As to rock mp3 for free from site mp3search.ru
http://video.antichat.net/file89.html
Code:
90. Sql-injection on cursor Php-Nuke
http://video.antichat.net/file90.html
Code:
91. SQL-injection in forum Zorum
http://video.antichat.net/file91.html
Code:
92. XSS and SQL-injection MyBB the forum
http://video.antichat.net/file92.html
Code:
93. Seizure Flesch chat room (part of 2)
http://video.antichat.net/file93.html
Code:
94. Seizure Flesch chat room (part 1)
http://video.antichat.net/file94.html
Code:
95. XSS in the forums in sparenykh BB tags VBulletin 3.0. *
http://video.antichat.net/file95.html
Code:
96. As to become adminom of forum ITA V1.49.
http://video.antichat.net/file96.html
Code:
97. Vulnerabilities in Zeroboard.
http://video.antichat.net/file97.html
Code:
98. Video about the the new XSS in the forums in sparenykh BB the tags
http://video.antichat.net/file98.html
Code:
99. UNION in SQL demands. Example of work.
http://video.antichat.net/file99.html
Code:
100. Vozmozhye vulnerabilities in scripts Manlix.
http://video.antichat.net/file100.html
Code:
101. As to become adminom on the site made in Flat-nuke.
http://video.antichat.net/file101.html
Code:
102. Error of adminov with installation Guestbook v1.1. Defeys on the rapid.
http://video.antichat.net/file102.html
Code:
103. Defeys for the small. Defeys on the rapid.
http://video.antichat.net/file103.html
Code:
104. Again PHPBB. if the provider of dull.
http://video.antichat.net/file104.html
Code:
105. XSS vulnerability in forum forum.antichat.ru (vbulletin 3.0.3)
http://video.antichat.net/file105.html
Code:
106. To the article about mail.ru. We steal Cooks in the chat room. More detailed video.
http://video.antichat.net/file106.html
Code:
107. To the article about mail.ru. We steal Cooks in the chat room. We become moderators chat.mail.ru.
http://video.antichat.net/file107.html
Code:
108. php inklyuding KorWeblog
http://video.antichat.net/file108.html
Code:
109. Breaking e-mail'ov 2. Sorting of passwords. Is utilized Brutus (under Windows).
http://video.antichat.net/file109.html
Code:
110. Breaking e-mail'ov. Is utilized THC - Hydra.
http://video.antichat.net/file110.html
Code:
111. Vulnerability Ultimate PHP Board (UPB) v1.9
http://video.antichat.net/file111.html
Code:
112. Forum Russian Board Or as it is not necessary to write authorization system. (found Max_.pain)
http://video.antichat.net/file112.html
Code:
113. As to obtain strange letters on ramblere
http://video.antichat.net/file113.html
Code:
114. LiteForum 2 (SQL-injection)
http://video.antichat.net/file114.html
Code:
115. We look passwords on forum Powered by Web Wiz Forums.
http://video.antichat.net/file115.html
Code:
116. Overcrowding of buffer. Theory.
http://video.antichat.net/file116.html
Code:
117. We steal UIN, having a base of the users
http://video.antichat.net/file117.html
Code:
118. As to steal the Internet on 445 port
http://video.antichat.net/file118.html
Code:
119. Baga ConfYmi 2.1
http://video.antichat.net/file119.html
Code:
120. We obtain root, I use sploita.
http://video.antichat.net/file120.html
Code:
121. Practitioner Flood
http://video.antichat.net/file121.html
Code:
17. [ FLASH ] rues on IBM AIX
http://video.antichat.net/file17.html
Code:
18. [ FLASH ] sequential of rues ispravlenym eksploytom
http://video.antichat.net/file18.html
Code:
19. Is utilized short hyphen. We make no invisible.
http://video.antichat.net/file19.html
Code:
20. Vulnerability http://www.chatmoscow.ru
http://video.antichat.net/file20.html
Code:
21. IRC. Mockery above Slader-Non
http://video.antichat.net/file21.html
Code:
22. Vulnerabilities SetccMS (XSS)
http://video.antichat.net/file22.html
Code:
23. Installation Apache, Php, Perl, Mysql to localhost
http://video.antichat.net/file23.html
Code:
24. Php- injection in the script of news CuteNews v1.3.1
http://video.antichat.net/file24.html
Code:
25. Method of the interpretation of khesha IPB 2..x and breaking the forum
http://video.antichat.net/file25.html
Code:
26. Breaking Invision Power Board sploytom
http://video.antichat.net/file26.html
Code:
27. New vulnerability PunBB
http://video.antichat.net/file27.html
Code:
28. cuz uze google'n'yandex before askin ' stupid questions %)
http://video.antichat.net/file28.html
Code:
29. WWWThreads Bug
http://video.antichat.net/file29.html
Code:
30. Breaking phpBB 2.0.15 new sploytom
http://video.antichat.net/file30.html
Code:
31. Active XSS in LiveJournal.com
http://video.antichat.net/file31.html
Code:
32. Installation of proxy to unix the machine
http://video.antichat.net/file32.html
Code:
33. XSS in phpBB with use phpNuke
http://video.antichat.net/file33.html
Code:
34. Idea of defeysa of the site through the search demands!
http://video.antichat.net/file34.html
Code:
35. Defeys of the site through the vulnerability in PunBB (php include)
http://video.antichat.net/file35.html
Code:
36. Breaking OF LARGE BROTHER - tntbrat.ru. SQL - injection.
http://video.antichat.net/file36.html
Code:
37. Breaking hack-info.net through PHP injection and GIF the file
http://video.antichat.net/file37.html
Code:
38. Breaking of the mailbox through the holes on the server
http://video.antichat.net/file38.html
Code:
39. SQL- Eng. in IPB 1. *, 2. *. Obtaining khesha of admina
http://video.antichat.net/file39.html
Code:
40. History of the breaking of one site
http://video.antichat.net/file40.html
Code:
41. XSS in MercuryBoard. New.
http://video.antichat.net/file41.html
Code:
42. Vulnerability IkonBoard. Reading it is file
http://video.antichat.net/file42.html
Code:
43. Error of khostera in tuning of system.
http://video.antichat.net/file43.html
Code:
44. Obtaining administrative privelegiy in paBugs
http://video.antichat.net/file44.html
Code:
45. Vulnerability phpBB in module downloads.php
http://video.antichat.net/file45.html
Code:
46. XSS in many search with- swing. It is in detail.
http://video.antichat.net/file46.html
Code:
47. Breaking phpBB new sploytom
http://video.antichat.net/file47.html
Code:
48. XSS in PunBB 1..x
http://video.antichat.net/file48.html
Code:
49. XSS in MercuryBoard 1..x
http://video.antichat.net/file49.html
Code:
50. Vulnerability in SR Guestbook
http://video.antichat.net/file50.html
Code:
51. Breaking of box on e-mail.ru (part of 2)
http://video.antichat.net/file51.html
Code:
62. Vulnerability in phpBB 2.0.12 (KEZ)
http://video.antichat.net/file62.html
Code:
63. Vulnerability in phpBB 2.0.12 (max_.pain89)
http://video.antichat.net/file63.html
Code:
64. We obtain seriynik for progi through ArtMoney
http://video.antichat.net/file64.html
Code:
65. We read strange letters on mail.ru through the sessions
http://video.antichat.net/file65.html
Code:
66. SQL injection in LedForums
http://video.antichat.net/file66.html
Code:
67. Example Post- Flood through DenyoLaunch III
http://video.antichat.net/file67.html
Code:
68. SQL injection in search.php in phpBB 2.0.6
http://video.antichat.net/file68.html
Code:
69. SQL injection in MercuryBoard 1.1.0
http://video.antichat.net/file69.html
Code:
70. Study of protection WinRAR 3..0b =)
http://video.antichat.net/file70.html
Code:
71. Second method of the theft of nikov in the chat room
http://video.antichat.net/file71.html
Code:
72. CHAT ROOM. Seizure of nikov.
http://video.antichat.net/file72.html
Code:
73. Presence s/n for WinZIP 8..0b
http://video.antichat.net/file73.html
Code:
74. We make patch for BlueFace (CodeFusion)
http://video.antichat.net/file74.html
Code:
75. We make patch for WinZIP 8..0b (CodeFusion)
http://video.antichat.net/file75.html
Code:
76. We penetrate in strange comp. through Remote Administrator
http://video.antichat.net/file76.html
Code:
77. Pincha no longer catches the antivirus
http://video.antichat.net/file77.html
Code:
78. Survey of bagov in cgi scripts.
http://video.antichat.net/file78.html
Code:
79. Idea of brutoforsa amperesecond through HTTP demands.
http://video.antichat.net/file79.html
Code:
80. As to drive away as'ku. One of the methods.
http://video.antichat.net/file80.html
Code:
81. By vlom with the aid of rAdmin Of brutforsera!
http://video.antichat.net/file81.html
Code:
82. one additional method to skachat' paid mp3 c of site mp3search.ru.
http://video.antichat.net/file82.html
Code:
83. Defeys on the rapid. Bagi on the server. Admin did not advance right on the folders.
http://video.antichat.net/file83.html
Code:
84. Vulnerability of site on cursor runcms
http://video.antichat.net/file84.html
Code:
85. Story about troyane pinch 1.0
http://video.antichat.net/file85.html
Code:
86. The new vulnerability Mybb. XSS works in all browsers.
http://video.antichat.net/file86.html
Code:
87. Breaking IcrediBB (SQL-injection)
http://video.antichat.net/file87.html
Code:
88. Baga in the the guest MPM Guesbook Pro
http://video.antichat.net/file88.html
Code:
89. As to rock mp3 for free from site mp3search.ru
http://video.antichat.net/file89.html
Code:
90. Sql-injection on cursor Php-Nuke
http://video.antichat.net/file90.html
Code:
91. SQL-injection in forum Zorum
http://video.antichat.net/file91.html
Code:
92. XSS and SQL-injection MyBB the forum
http://video.antichat.net/file92.html
Code:
93. Seizure Flesch chat room (part of 2)
http://video.antichat.net/file93.html
Code:
94. Seizure Flesch chat room (part 1)
http://video.antichat.net/file94.html
Code:
95. XSS in the forums in sparenykh BB tags VBulletin 3.0. *
http://video.antichat.net/file95.html
Code:
96. As to become adminom of forum ITA V1.49.
http://video.antichat.net/file96.html
Code:
97. Vulnerabilities in Zeroboard.
http://video.antichat.net/file97.html
Code:
98. Video about the the new XSS in the forums in sparenykh BB the tags
http://video.antichat.net/file98.html
Code:
99. UNION in SQL demands. Example of work.
http://video.antichat.net/file99.html
Code:
100. Vozmozhye vulnerabilities in scripts Manlix.
http://video.antichat.net/file100.html
Code:
101. As to become adminom on the site made in Flat-nuke.
http://video.antichat.net/file101.html
Code:
102. Error of adminov with installation Guestbook v1.1. Defeys on the rapid.
http://video.antichat.net/file102.html
Code:
103. Defeys for the small. Defeys on the rapid.
http://video.antichat.net/file103.html
Code:
104. Again PHPBB. if the provider of dull.
http://video.antichat.net/file104.html
Code:
105. XSS vulnerability in forum forum.antichat.ru (vbulletin 3.0.3)
http://video.antichat.net/file105.html
Code:
106. To the article about mail.ru. We steal Cooks in the chat room. More detailed video.
http://video.antichat.net/file106.html
Code:
107. To the article about mail.ru. We steal Cooks in the chat room. We become moderators chat.mail.ru.
http://video.antichat.net/file107.html
Code:
108. php inklyuding KorWeblog
http://video.antichat.net/file108.html
Code:
109. Breaking e-mail'ov 2. Sorting of passwords. Is utilized Brutus (under Windows).
http://video.antichat.net/file109.html
Code:
110. Breaking e-mail'ov. Is utilized THC - Hydra.
http://video.antichat.net/file110.html
Code:
111. Vulnerability Ultimate PHP Board (UPB) v1.9
http://video.antichat.net/file111.html
Code:
112. Forum Russian Board Or as it is not necessary to write authorization system. (found Max_.pain)
http://video.antichat.net/file112.html
Code:
113. As to obtain strange letters on ramblere
http://video.antichat.net/file113.html
Code:
114. LiteForum 2 (SQL-injection)
http://video.antichat.net/file114.html
Code:
115. We look passwords on forum Powered by Web Wiz Forums.
http://video.antichat.net/file115.html
Code:
116. Overcrowding of buffer. Theory.
http://video.antichat.net/file116.html
Code:
117. We steal UIN, having a base of the users
http://video.antichat.net/file117.html
Code:
118. As to steal the Internet on 445 port
http://video.antichat.net/file118.html
Code:
119. Baga ConfYmi 2.1
http://video.antichat.net/file119.html
Code:
120. We obtain root, I use sploita.
http://video.antichat.net/file120.html
Code:
121. Practitioner Flood
http://video.antichat.net/file121.html
Cool Trick
Cool Trick
If you are very much conscious about your space on hard drive, then a good idea would be uninstalling some unwanted application of windows such, which are never used, like Windows Messenger, but can’t find them on Add and Remove list, then try this one open notepad and open the file located in SystemRoot ( generally c:/> ) /windows/inf/sysoc.inf, once you have open the file then find the word “hide” in the file and simply delete it.
Now go to Add and Remove programs, Find the application, and uninstall it. Alternatively you can use this one to uninstall window messenger, click on run (start>run) now put this line and hit enter to uninstall windows messenger:
RUNDLL32 ADVPACK.DLL,LaunchINFSection %windir%\INF\MSMSGS.INF,BLC.Remove
Similarly to install back windows messenger just run this line:
RUNDLL32 ADVPACK.DLL,LaunchINFSection %windir%\INF\MSMSGS.INF,BLC.msmsgr
If you are very much conscious about your space on hard drive, then a good idea would be uninstalling some unwanted application of windows such, which are never used, like Windows Messenger, but can’t find them on Add and Remove list, then try this one open notepad and open the file located in SystemRoot ( generally c:/> ) /windows/inf/sysoc.inf, once you have open the file then find the word “hide” in the file and simply delete it.
Now go to Add and Remove programs, Find the application, and uninstall it. Alternatively you can use this one to uninstall window messenger, click on run (start>run) now put this line and hit enter to uninstall windows messenger:
RUNDLL32 ADVPACK.DLL,LaunchINFSection %windir%\INF\MSMSGS.INF,BLC.Remove
Similarly to install back windows messenger just run this line:
RUNDLL32 ADVPACK.DLL,LaunchINFSection %windir%\INF\MSMSGS.INF,BLC.msmsgr
To allow Windows XP to close non-responsive applications automatically upon shutdown:
To allow Windows XP to close non-responsive applications automatically upon shutdown:
In the above method we decrease the time of shut down of applications,
but by this tweak, Windows XP can be set to close crashed applications automatically. While this does not technically speed up the shut down process, it does streamline it, and ensure that the user will not give the shutdown command then get up and leave, only to find the PC still powered on because Windows never received input on what to do with a hung application.
Open REGEDIT and navigate to ‘HKEY_CURRENT_USER\Control Panel\Desktop’
Highlight the value ‘AutoEndTasks.’
Change the value to ‘1'
XP will now be able to close hung applications without user input during the shutdown process.
In the above method we decrease the time of shut down of applications,
but by this tweak, Windows XP can be set to close crashed applications automatically. While this does not technically speed up the shut down process, it does streamline it, and ensure that the user will not give the shutdown command then get up and leave, only to find the PC still powered on because Windows never received input on what to do with a hung application.
Open REGEDIT and navigate to ‘HKEY_CURRENT_USER\Control Panel\Desktop’
Highlight the value ‘AutoEndTasks.’
Change the value to ‘1'
XP will now be able to close hung applications without user input during the shutdown process.
Uninstalling Windows from Command Prompt
Uninstalling Windows from Command Prompt
One option included in Windows XP is the ability to uninstall XP if you performed an upgrade from Windows 98, 98SE, or Windows Me. The standard method of removing XP is achieved by booting into XP normally and uses the Add/Remove Programs tool in Control Panel. If you are unable to start XP normally, the second option is to load XP in Safe Mode then use the same tool. If you are unable to boot normally or boot into Safe Mode, XP can be removed by uninstalling from a Command Prompt. The procedure is as follows:
Important Note: This procedure is available only if a successful image of the previous operating system was created during the XP upgrade.
Start the computer to Safe Mode with Command Prompt.
At the command prompt, type cd\, and then press ENTER
Type cd\windows\system32, and then press ENTER.
Type osuninst.exe, and then press ENTER.
On screen instructions will guide you through the uninstall process to revert to the previous operating system.
This procedure can only be performed by users logged on as Administrator or a user with administrative rights.
One option included in Windows XP is the ability to uninstall XP if you performed an upgrade from Windows 98, 98SE, or Windows Me. The standard method of removing XP is achieved by booting into XP normally and uses the Add/Remove Programs tool in Control Panel. If you are unable to start XP normally, the second option is to load XP in Safe Mode then use the same tool. If you are unable to boot normally or boot into Safe Mode, XP can be removed by uninstalling from a Command Prompt. The procedure is as follows:
Important Note: This procedure is available only if a successful image of the previous operating system was created during the XP upgrade.
Start the computer to Safe Mode with Command Prompt.
At the command prompt, type cd\, and then press ENTER
Type cd\windows\system32, and then press ENTER.
Type osuninst.exe, and then press ENTER.
On screen instructions will guide you through the uninstall process to revert to the previous operating system.
This procedure can only be performed by users logged on as Administrator or a user with administrative rights.
Rename your processor
Correcting System Hang at Startup
Correcting System Hang at Startup
If your system hangs about 2 or 3 minutes at startup, where you can't access the Start
button or the Taskbar, it may be due to one specific service (Background Intelligent
Transfer) running in the background. Microsoft put out a patch for this but it didn't
work for me. Here's what you do:
· Click on Start/Run, type 'msconfig', then click 'OK'.
· Go to the 'Services' tab, find the 'Background Intelligent Transfer' service.
· Disable it, apply the changes & reboot.
(Note: Windows updates will not work correctly if this service is disabled)
If your system hangs about 2 or 3 minutes at startup, where you can't access the Start
button or the Taskbar, it may be due to one specific service (Background Intelligent
Transfer) running in the background. Microsoft put out a patch for this but it didn't
work for me. Here's what you do:
· Click on Start/Run, type 'msconfig', then click 'OK'.
· Go to the 'Services' tab, find the 'Background Intelligent Transfer' service.
· Disable it, apply the changes & reboot.
(Note: Windows updates will not work correctly if this service is disabled)
MAKING WINDOWS XP GENUINE THE EASY WAY
MAKING WINDOWS XP GENUINE THE EASY WAY
download jellybean keyfinder from this website
http://www.magicaljellybean.com/keyfinder.shtml
Now open keyfinder.exe
Click on options and click "change windows key"
Now enter this key and you're done.
*****************************
V2C47-MK7JD-3R89F-D2KXW-VPK3J
*****************************
P.S: this works on windows xp sp2 only......
ppl u can try this out...
this might sound silly but it works perfectly...
TRY INSTALLING IE7 OR MEDIA PLAYER11
download jellybean keyfinder from this website
http://www.magicaljellybean.com/keyfinder.shtml
Now open keyfinder.exe
Click on options and click "change windows key"
Now enter this key and you're done.
*****************************
V2C47-MK7JD-3R89F-D2KXW-VPK3J
*****************************
P.S: this works on windows xp sp2 only......
ppl u can try this out...
this might sound silly but it works perfectly...
TRY INSTALLING IE7 OR MEDIA PLAYER11
How to Speedup your PC by disabling various Services
How to Speedup your PC by disabling various Services
Windows XP has a lot of services, some of which are not needed for normal use. To speed up and increase your systems security, disable these services.
To enter service manager-
Go to Start > Run and type services.msc and hit enter
Scroll down and highlight the service you want to adjust, right-click on it and choose Properties.
Now click the stop button and select Disable or Manual in the Startup Type scroll bar.
:idea: A useful tip is that instead of disabling something you are unsure of, set it to manual. When you restart your machine if that service has started then it is probably required by one of your components or software products. If it is still OFF then consider disabling it for greater protection.
Here’s the list of useless services:
Alerter - notifies selected users and computers of administrative alerts. If this service is turned off, applications that use the NetAlertRaise or NetAlertRaiseEx APIs will be unable to notify a user or computer (by a Message Box from the Messenger service) that the administrative alert took place.
Recommendation: Disabled.
Application Layer Gateway Service - Provides support for 3rd party plug-ins for Internet Connection Sharing/Internet Connection Firewall. Required if using Internet Connection Sharing/Internet Connection Firewall to connect to the internet.
Recommendation: Automatic if using ICS, Disabled if not.
Application Management - Used for Assign, Publish and Remove software services. If you can not modify your software installation of certain applications, put this service in to Automatic or Manual.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Windows XP has a lot of services, some of which are not needed for normal use. To speed up and increase your systems security, disable these services.
To enter service manager-
Go to Start > Run and type services.msc and hit enter
Scroll down and highlight the service you want to adjust, right-click on it and choose Properties.
Now click the stop button and select Disable or Manual in the Startup Type scroll bar.
:idea: A useful tip is that instead of disabling something you are unsure of, set it to manual. When you restart your machine if that service has started then it is probably required by one of your components or software products. If it is still OFF then consider disabling it for greater protection.
Here’s the list of useless services:
Alerter - notifies selected users and computers of administrative alerts. If this service is turned off, applications that use the NetAlertRaise or NetAlertRaiseEx APIs will be unable to notify a user or computer (by a Message Box from the Messenger service) that the administrative alert took place.
Recommendation: Disabled.
Application Layer Gateway Service - Provides support for 3rd party plug-ins for Internet Connection Sharing/Internet Connection Firewall. Required if using Internet Connection Sharing/Internet Connection Firewall to connect to the internet.
Recommendation: Automatic if using ICS, Disabled if not.
Application Management - Used for Assign, Publish and Remove software services. If you can not modify your software installation of certain applications, put this service in to Automatic or Manual.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Make Your Menus Load Faster
Make Your Menus Load Faster
1. Go to Start then Run
2. Type ‘Regedit’ then click ‘Ok’
3. Find “HKEY_CURRENT_USER\Control Panel\Desktop\”
4. Select “MenuShowDelay”
5. Right click and select “Modify’
6. Reduce the number to around “100 ’
This is the delay time before a menu is opened. You can set it to “0’ but it can make windows really hard to use as menus will open if you just look at them - well move your mouse over them anyway.
1. Go to Start then Run
2. Type ‘Regedit’ then click ‘Ok’
3. Find “HKEY_CURRENT_USER\Control Panel\Desktop\”
4. Select “MenuShowDelay”
5. Right click and select “Modify’
6. Reduce the number to around “100 ’
This is the delay time before a menu is opened. You can set it to “0’ but it can make windows really hard to use as menus will open if you just look at them - well move your mouse over them anyway.
Do anyone know where the password file is stored in pc(user account's) ?
Do anyone know where the password file is stored in pc(user account's) ?
Here is the answer for it
Yes password file was stored in windows system32 config and sam file
named as SAM
location : C:\windows\system32\config\SAM
we can change password by entering into the location given above.
limitation:
you cant access properly if you have not the administrator rights even you can do the changes if you are added in the power user list other wise you cant do anything with the limited account.
But you can do using cmd as given below
Go to Dos type net user administrator *
press enter now type your own password
So now you have hacked the administrator
Here is the answer for it
Yes password file was stored in windows system32 config and sam file
named as SAM
location : C:\windows\system32\config\SAM
we can change password by entering into the location given above.
limitation:
you cant access properly if you have not the administrator rights even you can do the changes if you are added in the power user list other wise you cant do anything with the limited account.
But you can do using cmd as given below
Go to Dos type net user administrator *
press enter now type your own password
So now you have hacked the administrator
Sunday, December 21, 2008
Hack The time on the windows xp taskbar
Hack The time on the windows xp taskbar:
To hack the Time on the taskbar let's use the registry
Start -----> Run and type "regedit"
once on the regedit, we will navigate through HKEY_CURRENT_USER\Control Panel\International and select the"International folder"On the right panel we will change the value of s1159 and s2359 by MORNING and EVENING
To do that let's double click on s1159 or right click and click on modify and change AM by MORNING do the same thing to s2359
close all and that it is
To hack the Time on the taskbar let's use the registry
Start -----> Run and type "regedit"
once on the regedit, we will navigate through HKEY_CURRENT_USER\Control Panel\International and select the"International folder"On the right panel we will change the value of s1159 and s2359 by MORNING and EVENING
To do that let's double click on s1159 or right click and click on modify and change AM by MORNING do the same thing to s2359
close all and that it is
Saturday, December 20, 2008
Subscribe to:
Posts (Atom)