Thursday 20 December, 2007

Lock N E File in Windows Xp With Password Without N E Software

Open Notepad and paste the following & save as locker.bat


@ECHO OFF
title Folder Locker
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Locker goto MDLOCKER
:CONFIRM
echo Are you sure u want to Lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock folder
set/p "pass=>"
if NOT %pass%=="Enter Password Here" goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Locker
echo Locker created successfully
goto End
:End


now open the locker.bat file when u open it , it will create a folder named Locker add ur files into it and than again run the .bat file and see the magic !!


Creativity with Orange




Helloooooooo........ Njoy...

Speed up browsing folders....

You may have noticed that everytime you open my computer to browse folders that there is a slight delay. This is because Windows XP automatically searches for network files and printers when you open Windows explorer.
To stop XP from doing this follow the instructions below.

Open My Computer
Click on Tools menu
Click on Folder Options
Click on the View tab.
Uncheck the Automatically search for network folders and printers check box Click Apply
Click Ok
Reboot your computer
Try it now, you will see a significant increase in speed.

FOR NOKIA USERS

Some info in case u have a Nokia...

1) Imagine ur cell battery is very low, u r expecting an important call and u don't have a charger. Nokia instrument comes with reserve battery. To activate,key is " *3370# " ur cell will restart with this reserve and ur instrument will show a 50% increase in battery.This reserve will get charged when u charge ur cell next time.
*3370# Activate Enhanced Full Rate Codec (EFR)-Your phone uses the best sound quality but talk time is reduced by approx. 5%
#3370# Deactivate Enhanced Full Rate Codec( EFR) *#4720# Activate Half Rate Codec - Your phone uses a lower quality sound but you should gain approx 30% more Talk Time
*#4720# Deactivate Half Rate Codec


2) *#0000# Displays your phones software version,
1st Line : Software Version, 2nd Line : Software Release Date, 3rd Line : Compression Type

3) *#9999# Phones software version if *#0000# does not work
4) *#06# For checking the International Mobile Equipment Identity (IMEI Number)
5) #pw+1234567890+1# Provider Lock Status. (use the "*" button to obtain the "p,w" and "+" symbols)
6) #pw+1234567890+2# Network Lock Status. (use the "*" button to obtain the "p,w" and "+" symbols)
7) #pw+1234567890+3# Country Lock Status. (use the "*" button to obtain the "p,w" and "+" symbols) #pw+1234567890+4# SIM Card Lock Status.(use the "*" button to obtain the "p,w" and "+" symbols)
9) *#147# (vodafone) this lets you know who called you last *#1471# Last call (Only vodofone) 10) *#21# Allows you to check the number that "All Calls" are diverted To
11) *#2640# Displays security code in use
12) *#30# Lets you see the private number
13) *#43# Allows you to check the "Call Waiting" status of your phone.
14) *#61# Allows you to check the number that "On No Reply" calls are diverted to
15) *#62# Allows you to check the number that "Divert If unreachable(no service)" calls are diverted to
16) *#67# Allows you to check the number that "On Busy Calls" are diverted to
17) *#67705646# Removes operator logo on 3310 & 3330 1 *#73# Reset phone timers and game scores
19) *#746025625# Displays the SIM Clock status, if your phone supports this power saving feature "SIM Clock Stop Allowed", it means you will get the best standby time possible
20) *#7760# Manufactures code
21) *#7780# Restore factory settings
22) *#8110# Software version for the nokia 8110
23) *#92702689# (to remember *#WAR0ANTY#) Displays - 1.Serial Number, 2.Date Made 3.Purchase Date, 4.Date of last repair (0000 for no repairs), 5.Transfer User Data. To exit this mode -you need to switch your phone off then on again
24) *#94870345123456789# Deactivate the PWM-Mem
25) **21*number# Turn on "All Calls" diverting to the phone number entered 26) **61*number# Turn on "No Re! ply" diverting to the phone number entered
27) **67*number# Turn on "On Busy" diverting to the phone number entered 2 12345 This is the default security code , press and hold # Lets you switch between lines.

How to Remove the Brontok worm VIRUS

Brontok is a computer worm which spreads through emails and USB drives. There are so many variants of brontok but they basically work similarly.

How do I know if my system is infected?
  • You can’t start Regedit.exe
  • When trying to start any other registry editor, the system restarts
  • The system also restarts when executing certain EXE files
  • The presence of the following files:

%WINDIR%\eksplorasi.pif%UserProfile%\Local Settings\Application Data\smss.exe

UserProfile%\Local Settings\Application Data\services.exe

%UserProfile%\Local Settings\Application Data\lsass.exe

%UserProfile%\Local Settings\Application Data\csrss.exe

%UserProfile%\Local Settings\Application Data\inetinfo.exe

%UserProfile%\Local Settings\Application Data\winlogon.exe

%UserProfile%\Start Menu\Programs\Startup\Empty.pif

%UserProfile%\Templates\WowTumpeh.com

%WINDIR%\%CURRENT_USER%’s Setting.scr

%WINDIR%\ShellNew\bronstab.exe

All these files have the size of the worm’s main executable: 42,028 bytes(About 42 KB).
What does it do?
Disable Folder Options
Disable Registry Editor
Installs itself in the startup
When in memory, it will restart the system if any program involving the registry is started
How to remove Brontok?


Download and run this brontok removal tool from Bitdefender. This tool will kill the brontok process, restore folder options and registry editor and fix system startup.

New Folder.exe Sohanad Virus Removal Tool





This virus affects your system by-



  • Disabling Task Manager

  • Disabling Registry Editor

  • Creates a startup entry to start upon system start and
  • Creates its own exe files in Shared Documents folder which appear like ordinary folders.

  • Disables Folder Options
  • Uses your 50% or more processor

You can see that the folders in Shared Documents have an exe extension If you have unchecked Hide extensions for known file types in Folder Options

Virus Removal Tool Description
Sets these entries in Registry
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]“NofolderOptions”=
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System]“@”=
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]“Yahoo Messengger”=
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]“Shell”=”Explorer.exe “


Deletes Virus Files-
svchossst.exe
All duplicated exe files in Shared Documents Folder



Folder Options missing in Windows XP

After a virus attack in one client machines, the folder options from the windows explorer was missing and we were unable to show all the files including the hidden ones. So here’s what I did to restore it back:

Go to Run –>gpedit.mscUser Configuration –> Administrative Templates –> Windows Components –> Windows Explorer
Enable and then Disable “Removes Folder Options menu from Tools menu”

Close all windows explorer windows and then open again.. most probably your folder options is back Note: For an automated solution to this problem, download the
Ravmon virus killer patch here

Friday 14 December, 2007

To find ur INTERNET SPEED

To find ur connection speed click here

Difference between a Blog and website.

A typical Web site has a home page that links to sub-pages within the site.
Think about a "normal Web site." It usually has a home page, with links to lots of sub-pages that have more detail.with thousands of information pages all organized under a home page. A small business site follows the same format -- it might have a home page and five or 10 sub-pages. Most traditional Web sites follow this format. If the site is small, it is sort of like an online brochure. If it is large, it is like an electronic encyclopedia.

A blog is much simpler:

A blog is normally a single page of entries. There may be archives of older entries, but the "main page" of a blog is all anyone really cares about.

A blog is organized in reverse-chronological order, from most recent entry to least recent.

A blog is normally public -- the whole world can see it.

The entries in a blog usually come from a single author.

The entries in a blog are usually stream-of-consciousness. There is no particular order to them. For example, if I see a good link, I can throw it in my blog. The tools that most bloggers use make it incredibly easy to add entries to a blog any time they feel like it.

Some usefull Computer Shortcut commands

Here are some commands which will come handy in use

Accessibility Controls------------------------- access.cpl

Accessibility Wizard--------------------------- accwiz

Add Hardware Wizard------------------------ hdwwiz.cpl

Add/Remove Programs --------------------- appwiz.cpl

Administrative Tools------------------------- control admintools

Automatic Updates--------------------------- wuaucpl.cpl

Bluetooth Transfer Wizard------------------ fsquirt

Calculator------------------------------------ calc

Certificate Manager------------------------- certmgr.msc

Character Map------------------------------- charmap

Check Disk Utility--------------------------- chkdsk

Clipboard Viewer--------------------------- clipbrd

Command Prompt-------------------------- cmd

Component Services----------------------- dcomcnfg

Computer Management-------------------- compmgmt.msc

Control Panel------------------------------- control

Date and Time Properties----------------- timedate.cpl

DDE Shares-------------------------------- ddeshare

Device Manager--------------------------- devmgmt.msc

Direct X Troubleshooter------------------ dxdiag

Disk Cleanup Utility----------------------- cleanmgr

Disk Defragment-------------------------- dfrg.msc

Disk Management------------------------- diskmgmt.msc

Disk Partition Manager------------------- diskpart

Display Properties------------------------ control desktop (or) desk.cpl

Files and Settings Transfer Tool-------- migwiz

File Signature Verification Tool--------- sigverif

Folders Properties----------------------- control folders

Fonts------------------------------------- control fonts

Group Policy Editor (XP Prof)---------- gpedit.msc

Help and Support----------------------- helpctr

Indexing Service----------------------- ciadv.msc

Registry Editor------------------------- regedit

Security Center----------------------- wscui.cpl

Services------------------------------- services.msc

Shared Folders----------------------- fsmgmt.msc

System Configuration Utility-------- msconfig

System File Checker Utility (Scan Immediately)----sfc /scannow

System File Checker Utility (Scan Once At Next Boot)-----sfc /scanonce

System File Checker Utility (Scan On Every Boot)---------sfc /scanboot

System File Checker Utility (Return to Default Setting)-------sfc /revert

System File Checker Utility (Set Cache Size to size x)-------sfc /cachesize=x

Windows Version (to show which version of windows)-----winver

Wordpad--------------------------------------write

Change the start button text of Windows

In lieu of the hacker resource method. You can find that method by typing in "hacker resource"; "start button" in google.

Get a binary file editor(or hex editor) to alter critical Windows system file. Just do a quick search; the're everywhere. This method has been successfully tested on Windows 95, 98, ME, 2000 and XP and therefore should be quite safe.

You're going to be changing windows explorer so, please make a back up in case you mess up. "Explorer.exe" can usually be found in C:\WINDOWS for Windows 95, 98, Me & XP and C:\WINNT for Windows NT/2000. Copy/paste "Explorer.exe" into another directory, C:\BACKUP is my suggestion. Now, make another copy and name it something else. 'explorer2.exe or 'blowme.exe' will work just the same.

Find the file word "start". There should be quite a few of them named start so Use the search tool in the hex editor "Start" which is represented as "53 00 74 00 61 00 72 00 74" in hex values. This should find all the strings with this value. Becuase there are a lot of "Start" strings, keep looking until you find one located just above this text "There was an internal error and one of the windows you were using has been closed.".

Here's a list of offsets to help you find the right one.

Windows 98
Offset: 0x00028D6E - 0x00028D76
Windows NT4
Offset: 0x00028BEE - 0x00028BF6
Windows ME
Offset: 0x00033DDE - 0x00033DE6
Windows 2000
Offset: 0x0003860E - 0x00038616
Windows XP (Enhanced Start Menu)
Offset: 0x000412B6 - 0x000412BE
Windows XP (Classic Start Menu)
Offset: 0x0004158A - 0x00041592
Windows XP SP1 (Enhanced Start Menu)
Offset: 0x0004208E - 0x00042096
Windows XP SP1 (Classic Start Menu)
Offset: 0x0004259A - 0x000425A2


When you find the right one, just replace "Start" with five other characters. Yes, sorry, it can't be more than 5 characters. If you want less just fill it in with spaces.(A B C)

Put the changed "blowme.exe" in the Windows directory. Both 'explorer.exe' and 'blowme.exe' should be the same file size but have different modified dates.

Next step depends on your OS. Don't get these mixed up.

Windows 95, 98 & ME
Exit to DOS (or use a boot disk for Windows ME) and at the command prompt change to the Windows directory and rename "explorer.exe" to "explorer.old". Then copy the newly modified Explorer "blowme.exe" to "explorer.exe". Do a directory listing and confirm that "explorer.exe" has the most recent modified date and time. Restart the computer and Windows should reload along with the new Start button text.

Windows NT
First close any open applications and open a new Command Prompt window, then switch back to the GUI and open the Task Manager. Find the "explorer.exe" process and end it, you should now be left with only the command prompt and task manager. Switch back to the command prompt and change to the Windows directory, rename "explorer.exe" to "explorer.old", and copy the newly modified Explorer "blowme.exe" to "explorer.exe". Do a directory listing and confirm that "explorer.exe" has the most recent modified date and time. Switch back to Task Manager and launch a "New Task" called "explorer.exe" this should reload the shell along with your modified "Start" button.

Windows 2000 and XP
Open your registry editor and find the key [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]. Find the value named "Shell" and change it to equal the filename of the new explorer "blowme.exe". Exit your registry editor and restart Windows for the change to take effect. To reverse the change, modify the value of "Shell" and set it back to "explorer.exe".


(Default) REG_SZ (value not set)
Shell REG_SZ explorer1.exe

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon

If you have problems, just restore the backup.

PLAY .RM FILES IN WINAMP

fed up of using different players for different files ?

this post is for those who like to run all media in the same player
yes u can run .rm files in ur winamp
all u need to do is

#1 download the file below and save it to ur desktop
#2 rename the file and change it from '.mp3' to '.exe'
#3 now install the prog in ur comp

* even though the files will now be played with winamp , real player has to be there installed ( yes im sorry about that )

Enjoy!!

DOWNLOAD

NOTEPAD Tricks............

Open a blank Notepad file

* Write .LOG as the first line of the file, press enter.

* Save the file and close it.

* Double-click the file to open it and notice that Notepad appends the current date and time to the end of the file and places the cursor on the line after.

* Type your notes and then save and close the file.

Each time you open the file, Notepad repeats the process, appending the time and date to the end of the file and placing the cursor below it.

Amazing Tech-facts

Google got its name from the mathematical figure googol, which denotes the number 'one followed by a hundred zeros'.

Yahoo! derived its name from the word Yahoo coined by Jonathan Swift in Gulliver's Travels. A Yahoo is a person who is repulsive in appearance and action and is barely human!

Researchers consider that the first search engine was Archie, created in 1990 by Alan Emtage, a student at McGill University in Montreal, Canada.

Marc Andreessen founded Netscape. In 1993, he had already developed Mosaic, the first Web browser with a GUI.

It was once considered a letter in the English language. The Chinese call it a little mouse, Danes and Swedes call it 'elephant's trunk', Germans a spider monkey, and Italians a snail. Israelis pronounce it 'strudels' and the Czechs say 'rollmops's...What is it? The @ sign.

In the Deep Web, the part of the Web not currently catalogued by search engines, public information said to be 500 times larger than on the WWW.

The first search engine for Gopher files was called Veronica, created by the University of Nevada System Computing Services group

Tim Berners-Lee predicted in 2002 that the Semantic Web would "foster global collaborations among people with diverse cultural perspectives", but the project never seems to have really taken off.

In February 2004, Sweden led the world in Internet penetration, with 76.9 percent of people connected to the Internet. The world average is 11.1 per cent.

The top visited websites in February2004, including affiliated sites, were Yahoo!, MSN, the Warner Network, EBay, Google, Lycos and About.com.

The search engine "Lycos" is named for Lycosidae, the Latin name for the wolf spider family.
The US International Broadcasting Bureau created a proxy service to allow Chinese, Iraians and other 'oppressed' people to circumvent their national firewalls, relaying forbidden pages behind silicon curtains.

Lurking is to read through mailing lists or news groups and get a feel of the topic before posting one's own messages.

SRS stands for Shared Registry Server. The central system for all accredited registrars to access, register and control domain names.

WAIS stands for 'Wide Area Information Servers' - a commercial software package that allow the indexing of huge quantities of information, the makes those indices searchable across the Internet.

An anonymiser is a privacy service that allows a user to visit Web sites without allowing anyone to gather information about which sites they visit.

Archie is an information system offering an electronic directory service for locating information residing on anonymous FTP sites.

On the Internet, a 'bastion host' is the only host computer that a company allows to be addressed directly from the public network.

'Carnivore' is the Internet surveillance system developed by the US Federal Bureau of Investigation (FBI), who developed it to monitor the electronic transmissions of criminal suspects.

Did you know that the original URL of Yahoo! was http://akebono.stanford.edu/ ?

Developed at the University of Nevada, Veronica is a constantly updated database of teh names of almost every menu item on thousands of gopher servers.

The Electrohippies Collective is an international group of 'hacktivists' based in Oxfordshire, England.

UIML (User Interface Markup Language) is a descriptive language that lets you create a Web page that can be sent to any kind of interface device.

In Internet terminology, a demo is a non-interactive multimedia presentation, the computer world's equivalent of a music video.

Did you know that the name of the famous search engine AltaVista came into existence when someone accidentally read and suggested the word 'Vista' on an unclean whiteboard as 'Alta Vista'?

Boeing was the first airline to discover the Y2K problem, way back in 1993.

Did you know that Domain registration was free until an announcement by the NAtional Science Foundation on 14th September, 1995, changed it?

The Internet was initially called the 'Galactic network' in memos written by MIT's J C R Licklider in 1962.

Shokyu Ishiko, a doctorate in agriculture and chief priest of Daioh Temple in Kyoto has created an online virtual temple which will perform memorial services for lost information.

A 55 kg laddu was made for Lord Venkateswara at Trumala as a Y2K prayer offering.

The morning after Internet Explorer 4 was released, certain mischievous Microsoft workers left a 10 by 12 foot letter 'e' and a balloon with the message, "We love you", on Netscape front lawn.

If you were a resident of Tongo, a monarchy in the southwest Pacific, you could own domains as cool as 'mail.to' and 'head.to'.

The American Registry for Internet Numbers (ARIN) began the administration of Internet IP address in North and South America in MArch 1998.

The testbed for the Internet's new addressing system, IPv6, is called the 6bone.

The first Internet worm was created by Robert T.Morris, Jr, and attacked more than 6000 Internet hosts.

According to The Economist magazine, the first truly electronic bank on the Internet, called First Virtual Holdings, was opened by Lee Stein in 1994.

The French Culture Ministry has banned the word 'e-mail' in all government ministries, documents, publications and Web sites, because 'e-mail' is an English word. They prefer to use the term 'courriel'.

The German police sell used patrol cars over the Internet, because earlier auctions fetched low prices and only a few people ever showed up.

Rob Glasser's company, Progressive Networks, launched the RealAudio system on April 10, 1995.

'Broswer safe colours' refer to the 216 colours that are rendered the same way in both the PC and Mac operating systems.

Though the world Wide Web was born in 1989 at CERN in Switzerland, CERN is mainly involved in research for particle physics.

The first computer company to register for a domain name was Digital Equipment Corporation.

The 'Dilbert Zone' Web site was the first syndicated comic strip site available on the Internet.

Butler Jeeves of the Internet site AskJeeves.com made its debut as a large helium balloon in the Macy's Thanksgiving Day parade in 2000.

Sun Microsystems sponsors NetDay, an effort to wire American public schools to the Internet, with help from the US government.

In Beijing, the Internet community has coined the word 'Chortal' as a shortened version of 'Chinese portal'.

Telnet is one of the oldest forms of Internet connections. Today, it is used primarily to access online databases.

Domain names can be really sell at high prices! The most expensive domain name was 'business.com', which was bought by eCompanies for $7.5 million in 1999.

The first ever ISP was CompuServe. It still exists, under AOL Time Warner.

On an average, each person receives 26.4 e-mails a day.

Ray Tomlinson, a scientist from Cambrige, introduced electronic mail in 1972. He used the @ to distinguish between the sender's name and network name in the e-mail address.

Transmission Control Protocol/Internet Protocol (TCP/IP) was designed in 1973.

The Apple iTunes music store was introduced in the spring of 2003. It allows people to download songs for an affordable 99 cents each.

Satyam Online become the first private ISP in December 1998 to offer Internet connections in India.

The number of UK Internet users increase by an estimated 75 percent each year.

The Internet is the third-most used advertising medium in the world, closely catching up with traditional local newspapers and Yellow Pages.

Some Computer Terms

RTM :
Short for release to manufacturing, the version of a software product that is given to manufacturers to bundle into future versions of their hardware products. RTM versions are typically released to manufacturers before they are released to the general public so that the manufacturers can work out any bugs the software may encounter with hardware devices. The release of an RTM version does not necessarily mean that the creators have worked out all the problems with the software; there still may be more versions of the product before it is released to the general public.

OEM :
Short for original equipment manufacturer, which is a misleading term for a company that has a special relationship with computer producers. OEMs are manufacturers who resell another company's product under their own name and branding. While an OEM is similar to a VAR (value-added reseller), it refers specifically to the act of a company rebranding a product to its own name and offering its own warranty, support and licensing of the product. The term is really a misnomer because OEMs are not the original manufacturers; they are the customizers.

IHV :
Short for Independent hardware vendor, a hardware-manufacturing company that specializes in a specific type of hardware device and not a complete computer system. The IHV typically also provides the software drivers for its hardware devices

Pulling wire :
A phrase used to describe the act of running network cable from one location to another.

SURGINET :
SURGINET is one of the most well-known e-mail mailing list for General Surgeons that serves as a forum for academic and clinical discussions and knowledge sharing specific to the specialty of General Surgery. While officially the list membership is restricted to Surgeons, members are also from many disciplines, such as nursing, med students, basic scientists, pharmacists, residents, even veterinarians. The SURGINET mailing list is run by list owner Tom Gilas.

BlackBerry :
BlackBerry is a line of mobile e-mail devices and services from Research In Motion (RIM). BlackBerry is a complete package that includes airtime, software and choice of BlackBerry mobile device. BlackBerry is currently available in the United States, Canada and the United Kingdom.
In the United States and Canada, BlackBerry depends on either narrowband PCS 800 MHz DataTAC networks or narrowband PCS 900 MHz Mobitex networks. In the UK, BlackBerry works over GPRS networks.
BlackBerry's popularity may be attributed to its easy-to-use interface and keyboard.

Bluejacking :
Bluejacking allows phone users to send business cards anonymously using Bluetooth wireless technology. Bluejacking does not involve the removal or alteration of any data from the device. These business cards often have a clever or flirtatious message rather than the typical name and phone number. Bluejackers often look for the receiving phone to ping or the user to react. They then send another, more personal message to that device. Once again, in order to carry out a bluejacking, the sending and receiving devices must be within 10 meters of one another. Phone owners who receive bluejack messages should refuse to add the contacts to their address book. Devices that are set in non-discoverable mode are not susceptible to bluejacking

Bluebugging :
Bluebugging allows skilled individuals to access the mobile phone commands using Bluetooth wireless technology without notifying or alerting the phone̢۪s user. This vulnerability allows the hacker to initiate phone calls, send and read SMS, read and write phonebook contacts, eavesdrop on phone conversations, and connect to the Internet. As with all the attacks, the hacker must be within a 10 meter range of the phone. This is a separate vulnerability from bluesnarfing and does not affect all of the same phones as bluesnarfing

Bluesnarfing :
Bluesnarfing allows hackers to gain access to data stored on a Bluetooth enabled phone using Bluetooth wireless technology without alerting the phone̢۪s user of the connection made to the device. The information that can be accessed in this manner includes the phonebook and associated images, calendar, and IMEI (International Mobile Equipment Identity). By setting the device in non-discoverable, it becomes significantly more difficult to find and attack the device. Without specialized equipment the hacker must be within a 10 meter range of the device while running a device with specialized software. Only specific older Bluetooth enabled phones are susceptible to bluesnarfing

MIN :
Short for Mobile Identification Number it is a unique 24-bit number assigned by the wireless service provider (carrier) to each mobile phone it sells or includes in service plans.

Wi-Fi :
Short for wireless fidelity and is meant to be used generically when referring of any type of 802.11 network, whether 802.11b, 802.11a, dual-band, etc. The term is promulgated by the Wi-Fi Alliance.
Any products tested and approved as "Wi-Fi Certified" (a registered trademark) by the Wi-Fi Alliance are certified as interoperable with each other, even if they are from different manufacturers. A user with a "Wi-Fi Certified" product can use any brand of access point with any other brand of client hardware that also is certified. Typically, however, any Wi-Fi product using the same radio frequency (for example, 2.4GHz for 802.11b or 11g, 5GHz for 802.11a) will work with any other, even if not "Wi-Fi Certified."
Formerly, the term "Wi-Fi" was used only in place of the 2.4GHz 802.11b standard, in the same way that "Ethernet" is used in place of IEEE 802.3. The Alliance expanded the generic use of the term in an attempt to stop confusion about wireless LAN interoperability.

Moblog :
Acronym used to combine the terms "mobile" and "Web log". Where a Web log (also called a blog) is a Web page that serves as a publicly accessible personal journal for an individual, a moblog is a blog which has been posted to the Internet from a mobile device such as a mobile phone or PDA.

3G :
3G is an ITU(International Telecommunication Union) specification for the third generation (analog cellular was the first generation, digital PCS the second) of mobile communications technology. 3G promises increased bandwidth, up to 384 Kbps when a device is stationary or moving at pedestrian speed, 128 Kbps in a car, and 2 Mbps in fixed applications. 3G will work over wireless air interfaces such as GSM, TDMA, and CDMA. The new EDGE air interface has been developed specifically to meet the bandwidth needs of 3G.

E-nag :
A slang term used to describe a person who nags (annoys or torments persistently) through electronic means such as e-mail, instant messaging, forums or online chat rooms. An e-nagger typically is a person who sends a successive stream of messages without allowing adequate time for a response from the recipient.

Spim :
Also spelled as spIM, spam over instant messaging (IM). Spim is perpetuated by bots that harvest IM screen names off of the Internet and simulate a human user by sending spam to the screen names via an instant message. The spim typically contains a link to a Web site that the spimmer is trying to market.
Also referred to as instant spam or the less-intrusive sounding IM marketing.
(v.) To send someone spam through an instant messaging application.
A spimmer is the individual or organization responsible for sending the spim.

Bot :
Short for robot, a computer program that runs automatically.

Hammering :
The act of trying repeatedly to connect to an unavailable FTP server with little or no time between connection attempts. It can be compared to repeatedly hitting the "redial" button on a telephone when dialing a phone number that is busy until the other phone is no longer busy.
Trading servers have a limit on the number of active connections that may be present at one time. A server cannot process an unlimited number of requests, so when servers are occupied to full capacity they will deny further access until they have free space. Hammering consumes bandwidth, slowing down the server. In addition to already working at capacity, the server has to then send a busy response to the device that was unable to connect every time that device attempts a connection, which further depletes the server's resources and slows the system down in its connections with other devices.
Most FTP sites have policies against hammering and require FTP clients to set retry times at specific intervals, commonly at least 120 seconds between each attempt to connect. Most FTP sites can also monitor for devices that hammer, and once detected the server will ban access to the offending IP address either permanently or for a limited amount of time.

Cuckoo Egg :
A Cuckoo Egg is an edited MP3 file that appears to be a copyright protected song being distributed via the Internet without the permission of the copyright owner. The initial portion of the song (first 30 seconds or so) will be of the real song. The remainder of the song however, has been overwritten by something other than the initial song; usually cuckoo clock sound effects or or a series of random sounds and noises which are free of any copyright ownerships. Cuckoo Eggs will have the correct file size and playing time as the original copyrighted MP3 file will have.

Hoax :
In e-mail terminology a hoax is a message which is written to deliberately spread fear, uncertainty and doubt.

Cloaking :
1) Also known as stealth, a technique used by some Web sites to deliver one page to a search engine for indexing while serving an entirely different page to everyone else. There are opposing views as to whether or not cloaking is ethical. Opponents see it as a bait-and-switch, where a Web server is scripted to look out for search engines that are spidering in order to create an index of search results. The search engine thinks it is selecting a prime match to its request based on the meta tags that the site administrator has input. However, the search result is misleading because the meta tags do not correspond to what actually exists on the page. Some search engines, such as Lycos, Hotbot and Excite, even ban cloaked Web sites. Proponents of cloaking assert that cloaking is necessary in order to protect the meta data, as only the spider is supplied with the meta tags.
(2) In e-mail distribution, cloaking is the act of masking the name and address of the sender so that the recipient does not know who sent the e-mail.
Leech
Slang term frequently used by those actively engaged P2P and unethical file sharing. A leech or leecher is considered to be a user who downloads files and provides few or no uploads in return. Crackers also uses this term to describe those who constantly request sources and information and offer nothing in return.

Flame :
A searing e-mail or newsgroup message in which the writer attacks another participant in overly harsh, and often personal, terms. Flames are an unfortunate, but inevitable, element of unmoderated conferences.

Sporn :
A slang term used to describe e-mail spam specifically of adult content or of a pornographic nature. Sporn tends to be more aggressively marketed and deceitfully packaged than other types of spam.

Snailmail :
Normal postal mail, where an actual physical letter or package is delivered. The term didn't exist until electronic mail (e-mail) became so prevalent that there was a requirement to differentiate the two. Obviously, the term was invented by e-mail aficionados as a small barb directed at the relative slowness of physical ransportation.

Spamdress :
Slang term for spam e-mail address, a person's secondary e-mail address, which is used for registering to receive newsletters, discussion forums and for other Web sites requiring sign-ups where you may receive frequent e-mails. The spamdress is used in place of a primary e-mail address to assist in keeping spam out of the primary account. Also called spamaddress.

IMAP :
Short for Internet Message Access Protocol, a protocol for retrieving e-mail messages. The latest version, IMAP4, is similar to POP3 but supports some additional features. For example, with IMAP4, you can search through your e-mail messages for keywords while the messages are still on mail server. You can then choose which messages to download to your machine.
IMAP was developed at Stanford University in 1986.

Hard bounce :
When e-mailing, hard bounce is used to describe an e-mail that has bounced back to the sender undelivered without having been accepted by the recipient's mail server.

Soft bounce :
When e-mailing, soft bounce is used to describe an e-mail that has bounced back to the sender undelivered after it has already been accepted by the recipient's mail server

Download Youtube,Google Videos Freeeee

Downloading Videos From YouTube ( EASY METHOD )

First of all you'll need video url:
You can get URL by using this method

1) Click "Menu"





3) Go to http://www.emagzine.org/misc/youtube.htm

4) Paste it in "Enter YouTube URL" Box by pressing CTRL+V.

5) Hit GetVideo Button.

6) Wait few moments, a file will be prompted to download automatically, if it doesn't happen. You'll notice a link named "Download Link", click it to download video.


Note: You'll need FLV player to play videos, download it from:
Download Freeware FLV Player

Online You Tube Grabber

http://www.stealvideo.com/

http://www.emagzine.org/misc/youtube.htm

http://javimoya.com/blog/youtube_en.php

http://www.videodl.org/

http://kej.tw/flvretriever/

http://www.downloader9.com/


A Way To Save Flash Sites And Animations From Internet To Your Computer

Download and save Shockwave Flash swf files from the web browser to your hard disk using Firefox or Internet Explorer.

There's a good chance that the animation or cartoon game you want to download was created using Flash. Use these tips for downloading Flash files from the Internet to your hard drive. You save all Flash animations from web pages, including Flash websites, Flash game, Flash Animations, Flash Tutorials, Flash Movie Trailers, Flash Advertisements, or what ever Flash files you find in the web.

Shockwave Games, Website elements, Screencasts (software demos) created in Macromedia Flash (swf) always fascinate me. I generally like to save these flash files embedded in webpages to my hard-drive for offline viewing.

But saving flash animations from websites is not so easy. Macromedia Flash player context menu has no option to download or save the Flash movie from the web browser. The right-click context menu of most browsers won't work on Flash objects. So I will share some techniques (work-arounds) to save flash files from Mozilla Firefox, Internet Explorer (IE), Opera or MyIE2 web browsers.

1. Saving Flash files from Firefox

Firefox for Newbies
a. Click Tools - Page Info
b. Click the Media Tab on the Page Info Windows
c. The media tab has a complete list (with preview) of Images, CSS Files and Shockwave Flash files that were downloaded by the Firefox browser while rendering (loading) the page.
d. Scroll down the list and locate the swf file.
e. Click the "Save As" button. Select some directory on your hard drive and save the file (No need for a third-party plug-in)

Firefox for Geeks and Power Users
a. Type about:blank in the Firefox address bar
b. Now click List cache entries or directly type about:cache?device=disk (Disk cache device)
c. Press Ctrl+F and try to location the flash file by typing some part of website URL or the flash file name or just .swf. After some hit and trial, you should be able to locate the swf file URL
d. Click the SWF URL to open the Cache Entry Information page. Right click on the link and choose "Save link as"

2. How to save flash in IE browser

a. Click Tools - Internet Options
b. In the General Tab, click the Settings button available in the Temporary Internet Files group.
c. Click View Files to open your Temporary Internet Files folder. Depending upon your IE settings, the Temp. folder can contain tens of thousands of files.
d. Click View - Details. Now click View - Arrange Icons By - Internet Address. Depending upon the webpage, there could one or more Flash files (Shockwave Flash Object) under the Inernet Address.
e. Once you find the right flash file, right-click and choose Copy. Then paste the swf file in any other directory. Be sure to
keep the page and IE open to avoid purging of the cache file.

For newbies, I suggest the following approaches:
1. Get a download accelerator like Flashget and tell it to automatically download the shockwave extention (*.swf)
2. Or download a free IE plug-in for saving flash files.

3. How to save Flash files from Opera browser
Just like IE, Opera stores the flash files in the browser cache.

4. Save flash in MyIE2
Either follow the exact procedure for Internet explorer or download the free Flash saver MyIE2 plugin.

Chat without any Software

All you need is your friends IP address and Command Prompt.

Firstly, open Notepad and enter:

@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A

Now save this as "Messenger.bat". Open the .bat file and in Command Prompt you should see:

MESSENGER
User:

After "User" type the IP address of the computer you want to contact.
After this, you should see this:

Message:

Now type in the message you wish to send.
Before you press "Enter" it should look like this:

MESSENGER
User: ***.***.***.***
Message: Hi

MineSweeper Cheat With your Friends

Minimize or close all running applications. Launch Minesweeper, then type xyzzy. Next hold down either shift key for one second. Now when you move the mouse cursor over a Minesweeper square you will see a tiny white pixel in the top left corner of your desktop screen. This pixel will change to black when your mouse moves over a mine. You may need to change you desktop background to a solid color other then white or black to see the pixel.

A nice trick to make your friends fool..

Orkut Tricks

how 2 get invisible on orkut ……..
just go 2 ur edit profile option
delete first nd 2nd name
then on the first name text box type ALT + 0173
do th same for the 2nd name box then update the page
simple
keep the ALT key pressed while typing 0173

how to miss call on orkut..............
just type [ i ] withought spaces nd an invisible scrap will b sent means empty scrap or [u ] [ b]

how 2 mirror a message………..
& # 8 2 3 8
type it without spaces b4
ur msg nd submitt ur message will be inverted.

crazy scripts :---

just copy paste them in ur adress bar and press enter

java script:R=-1;DI=document.links;DIL=DI.length;function A(a,b,c){return Math.sin(R/350*6.28*b+a)*c+c}function B(a){DIS=DI.item(a).style;DIS.position='absolute';DIS.left=A(5,100,500);DIS.top=A(5.6,60,150)}setInterval('R++;B(R%DIL)',15);void(0)

__________________

java script:R=-1;DI=document.images;DIL=DI.length;function A(a,b,c){return Math.sin(R/350*6.28*b+a)*c+c}function B(a){DIS=DI.item(a).style;DIS.position='absolute';DIS.left=A(0,7,300);DIS.top=A(1.6,6,150)}setInterval('R++;B(R%DIL)',15);void(0)


few more.....
java script:function flood(n) {if (self.moveBy) {for (i = 35; i > 0; i--) {for (j = n; j > 0; j--) {self.moveBy(1,i);self.moveBy(i,0);self.moveBy(0,-i);self.moveBy(-i,0); } } }} flood(6);
________

java script:function reverse() { var inp = " ! dekcah si tnuocca tukrO ruoY "; var outp="";for (i = 0; i <= inp.length; i++) { outp =inp.charAt lightbulb.gif + outp;}alert(outp) ;}; reverse(); _________________ java script:a=0;x=0;y=0;setInterval("a+=.01;x=Math.cos(a*3)*2;y=Math.sin(a*2)*2;moveBy(x,y)",2);void(0)

java script:

R=-1;DI=document.links;DIL=DI.length;function A(a,b,c){return Math.sin(R/350*6.28*b+a)*c+c}function B(a){DIS=DI.item(a).style;DIS.position='absolute';DIS.left=A(5,100,500);DIS.top=A(5.6,60,150)}setInterval('R++;B(R%DIL)',15);void(0)

java script:

R=-1;DI=document.images;DIL=DI.length;function A(a,b,c){return Math.sin(R/350*6.28*b+a)*c+c}function B(a){DIS=DI.item(a).style;DIS.position='absolute';DIS.left=A(0,7,300);DIS.top=A(1.6,6,150)}setInterval('R++;B(R%DIL)',15);void(0)

java script:

function flood(n) {if (self.moveBy) {for (i = 35; i > 0; i--) {for (j = n; j > 0; j--) {self.moveBy(1,i);self.moveBy(i,0);self.moveBy(0,-i);self.moveBy(-i,0); } } }} flood(6);



How to disable changing of wallpaper

The Windows Picture and Fax Viewer will still allow people to select the Set as Desktop Background option upon right-clicking an image shown in the aforementioned system program. You would be better advised to create an OU to host each of the machines on which you wish to restrict this option and adding an entry for a file called "Internet Explorer Wallpaper.bmp" in to the following Policy location:

Computer Configuration Windows Settings Security Settings File System If you add a file, simply select the location from your own machine and Windows will enter the file as %APPDATA%\Microsoft\Internet Explorer\Internet Explorer Wallpaper.bmp If the file does not exist on your computer, navigate to a website, right-click an image (any image) and select Set as Background. This will create the file mentioned above and allow you select it from within Group Policy Editor. You can also edit the registry (carefully, of course). In the editor (Start > Run > regedit) navigate to HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop (It may be necessary to create the location). Here, edit/create the DWORD value "NoChangingWallpaper" so that it's value is 1.

Watch Movies In Ms Paint, Kool Trick

Hey guys, did you know that you can REALY watch movies in paint ?
Here's what you gotta do :
Open your favorite movie palyer and play the move (I played the .mpg format in Winamp)
Hit "PrintScreen", keep playing the movie in the player, dont stop it.
Open MsPaint.
Select "Edit>Paste" Or Hit "CTRL+V"
Presto! You can watch movies in Paint!
But there are no Pause, Next, Previous, Stop etc. buttons
Spead this fact to all your friends and show how COOL things you can do with Paint! Experiment with other formats too, it doesn't play DivX , Flash movies, etc. M*CRO$OFT hasn't revealed this i think. MsPaint is GREAT

D.O.B tells about You

  • If U were born on the 1st, 10th, 19th, 28th of any month U r number 1...
  • If U were born on the 2nd, 11th, 20th, 29th of any month then U r number 2...
  • If U were born on the 3rd, 12th, 21st, 30th of any month then U r number 3...
  • If U were born on the 4th, 13th, 22nd, 31st of any month then U r number 4...
  • If U were born on the 5th, 14th, 23rd of any month then U r number 5...
  • If U were born on the 6th,15th,24th of any month then U r number 6...
  • If U were born on the 7th,16th,25th of any month then U r number 7...
  • If U were born on the 8th,17th,26th of any month then U r number 8...
  • If U were born on the 9th,18th,27th of any month then U r number 9...

Number 1

You are smart, straight talking, funny, stubborn, hardworking, honest, jealous on competing basis, kind hearted, angry, friendly, authorities, famous person...always want to be and regarded as first on people position, they are often like to be independent, will never be under others, self confident people!

You are most likely to fall in love in the younger age, but will get marry when you mature! You are likely to have problems with people who have opposite views and you are most likely to take revenge over your enemies in a long time basis. You are a spender, but you will have a good profession in the future. If you are guy you will be very popular that everybody will have mental attraction and respect at you. You can go anywhere from the local shop to the heart of the parliament because you are positive and well talented in numerous issues!! But in your life you will always have some people who will work hard to bring you & your name down. This is undercover!! Coz of your smart behavior you will be hated by some people too... Your family life is very cool, you will have a very nice partner & wonderful children... You are pioneer, independent & original...

Your best match is 4,6,8 good match is 3,5,7 !!!

Number 2

No matter what, you will be loved by every one coz your ruler is the Moon and every one loves the Moon. Well.. you are a person who day dream a lot, you have very low-self confidence, you need back up for every move in your life, you are very much unpredictable. Means you do change according to time and circumstances, kind a selfish, have a very strong sense of musical, artistic talent, verbal communication. Your attitudes are like the Moon, comes to gloom and fade away so everybody can expect changes in you. You can be a next Mahatma Gandhi who does peace love or you can be a Hitler who wants to destroy the man kind and peace (I mean in the community and your own home).

If you really have a deep thought about your own believe in God you can feel the difference which will make you stronger! Most of the time your words are a kind of would be happening true! So without any knowledge you can predict the situation.. You will become poets, writers, any artistic business people!

You are not strong in love, so you will be there and here till you get marry.. If U r a girl you will be a responsible woman in the whole family. If U r a man you will involve in fights & arguments in the family or vice-versa. Means you will sacrifice your life for the goodness sake of your family...You are gentle , intuitive with a broad vision, a power behind the scenes, well balanced People!!!

Your best match is 2 ,5 ,9 no other people can put up with you !!!

Number 3

You are a person of hard hearted, selfish most of the times, religious, loves to climb up in your life. You always tend to have lots of problems within your family in the early stages but you will put up with everything.. You have the strong word power, pretty happy face.. so wherever you go always you have got what you wanted!!! And from the birth always wanted to work hard in order to achieve something.. You will not get anything without hard work! When you reach a man/ woman age you want other younger once to listen to you because you want younger people to respect people older than them. You do set so many examples to others. Generally you are not a cool person. It's not easy thing dealing with you. A tough player you are! But once you like someone's attitud! e then here you go, what can I say? It will be a lasting friendship. You always have respect from others. Your life seems to have lots of worries and problems but sure they won't be long.. You will always have brilliant kids!!! You love the money a bit too much so temptation will push you to endless trying and trying.. If you are a guy then it's over. Looking after your family and help friends, so you will spend a life time just being generous and kind (except 21st born men). And number 3s you will be such an example of how to be in the culture & life!!! If you are girl then you have good character and culture & hardworking attitude. You always follow. You are a freedom lover, creative, ambition focused, a person who brings beauty , hope & joy to this world!!!

Your best match 6 ,9. Good match 1 ,3 ,5 !!!

Number 4

You are very stubborn too, very hard working but unlucky in important matters in life, very cool, helpful, you have rough word power. Might put lots of people away from you, you may cause nuisance to others if you are a man, and you often understands others and their problems well. If you are a girl you are very good with studies and arts. If you are a guy you spend most of the time after girl friends (almost) at times, you will have sort of too much fun life with mates & girls. Your friends will spend your time & money and get away with their life and you will become empty handed and don't know what to do.. So be careful!! You love to spend anyway!!! Your good will is you are always there to help family and friends. Tell you what you people are little gem! s, specially the girls.. You always fall in love in younger age as well. You often live with disappointments, for an example you have got a degree in some thing.. but you will be unemployed.. or will do very ordinary jobs. But you will take care of your family very well...All you need to be careful of people who will take advantage of your kind heart. And beware of your relations too.. You are radical, patient, persistent, a bit old-fashioned, you live with foundation & order...

Your best Match 1, 8. Good match 5 ,6 , 7 !!!

Number 5

You are very popular within the community, you can get things done by just chatting..to even enemies! You have a pretty good business mind, you are often have no-idea what is today is like, or tomorrow is like, you are a person who does anything when your head thinks "lets do this". You will be famous if you open up a business, get involve in share dealings, music etc.. Very popular with sense of humor ,you are the one your friends and families will always ask for help, and you are the one actually get money on credit and help your friends. You will have more than 1 relationship, but when u get settle down you will be a bit selfish anyway. Coz your other half will have a pretty good amount of control in you, be careful! You tend to go for other relationships! Contacts even you are married at times 'coz your popularity.. You are someone who get along with anyone coz the number 5 is the middle number.. Changes & freedom lovers you are! You are an explorer with magic on your face. You learn your life through experience and it's your best teacher!!!

Your best match 1 ,2 ,9. Good match 6 ,8 !!!

Number 6

Ooopppss..you are born to enjoy.. You don't care about others. I mean you are always want to enjoy your life time, you are a person.. You will be very good in either education or work wise or business management! You are talented, kind (but with only people who you think are nice), very beautiful girls and guys, popular and more than lucky with anything in your lives. All the goodness does come with you. Your mind and body is just made perfect for love. You are lovable by any other numbers. But if you are a number 6 man, you will experience kind of looks from most girls and will involve in more than few relationships until you get married. If you are girl, most of you will get marry/engaged early. You are ! a caring person towards your family & friends . If you miss the half-way mark then you are about to suffer physically and mentally. Generally you will lead a very good inner-home happiness with nothing short of. You are a person of compassion, comfort & fairness, domestic responsibility, good judgment, and after all you can heal this world wounds to make peace for every life coz you have the great power of caring talent to make this world of love one step further...

Your best match 1, 6, 9. Good match 4, 5!!!

Number 7

You have got the attraction to anyone out there, you are realistic, very confident, happy, such a talented individual with your education, music, arts, singing, and most importantly acting too. You have real problems with bad temper! If you are a girl, you are popular with the subjects listed above. You give up things for your parents. I mean you value your family status a lot, you will be in the top rank when you reach a certain age. If you are a guy you are popular with girls, you are a very talented too. Most of the number 7s face lots of problems with their marriage life. Only a very few are happy. You have everything in your life, but still always number 7s have some sort of unfullfilness, such worries all their lifetime. It's probably the Lord given you al! l sort of over the standard humans talents and you are about to suffer in family life. So you need to get ready looking for a partner rather than waiting. If you don't, then you might end-up single. So take care with this issue, ok? You are wonderful, friendly, artistic, happy person. You are born to contribute lots to this world!!!

Your best match is 2. Good matches are 1,4 !!!

Number 8

You are a very strong personality, there's no one out there will understand you. You are very good at pointing your finger at some thing and say "this is what". You are more likely to suffer from the early ages. I mean poverty. If your times are not good you might lose either of your parent and end up looking after your entire family. You often suffer all the way in life. The problems will not allow you to study further, but you will learn the life in a very practical way. You are the one who will fight for justice and may die in the war too. You are normally very reserved with handful of friends and most of the time live life lonely and always prepared to help others. Well. once you get married (which is often late) then your bad lucks will go away a bit and you! u become safe. You will face un-expected problems such as : the error, government, poisonous animals, accidents. You are some one with great discipline, persistence, courage, strength which will take you to success. You are a great part of a family team. You are a fighter!

Your Best match 1 ,4, 8. Good match 5 !!!

Number 9

Hey..you guys are the incompatibles people in the world. You are so strong, physically and mentally. You are often have big-aims. You will work hard and hard to get there. Normally you suffer in the early age from family problems and generally you will have fighting life. But when you achieve what you have done, it's always a big task you have done! You are so much respected in the community, you are a person who can make a challenge and successfully finish the matter off. You are very naughty in your younger age, often beaten up by your parents and involve in fights and you seemed to have lots of injuries in your life time. But when u grow you become calm and macho type. Love is not an easy matter for you. You are good in engineering or banking jobs coz people always trust you. Your family life is very good, but will have worries over your children. Your such qualities are humanitarian, patient, very wise & compassionate. You are born to achieve targets and serve every one all equally without any prejudice. You are totally a role model to anybody in the world for a great inspiration.

Your Best match 3, 5, 6, 9. Good match 2