Tuesday, September 30, 2008
1st Evidence Remover 2.4
1st Evidence Remover 2.4 - 1 MB
Cleans your Windows of any evidence and temporary files
When you delete your files using the Delete command, Windows does not actually delete the files but places them to the hidden RECYCLER folder, and even if you use the Empty Recycle Bin command, some files may stay in this folder and can not be deleted by Windows.
1st Evidence Remover is a complex security system that ensures your security and privacy by destroying all hidden activity information on demand, according to a user-defined schedule or on each boot/shutdown.
The program does not damage your Windows and does not delete your documents, it only removes needless registry entries and files that may potentially contain evidence and endanger you needlessly.
1st Evidence Remover also removes temporary files left by your system making it cleaner and running faster.
Install 1st Evidence Remover on your PC before it is too late!
Compatibility:
Windows 9x/ME
Windows NT4
Windows 2000
Windows XP
Windows 2003
Windows Vista
Download: (Size: 1 MB)
http://www.adrive.com/public/9624462a0a3c7d21a78dd55ebb838c08e2b76dbb3a54abbe64601cbe482610a5.html
Sunday, September 28, 2008
CHINA Mobile Phones Secret Codes
Default user code: 1122, 3344, 1234, 5678
Engineer mode: *#110*01#
Enable COM port: *#110*01# -> Device -> Set UART -> PS Config -> UART1/115200
Factory mode: *#987#
LCD contrast: *#369#
Restore factory settings: *#987*99#
Software version: *#800#
Software version: *#900#
Set default language: *#0000# Send
Set English language: *#0044# Send
Set English language (new firmware): *#001# Send
Service codes Fly:
2040(i) reset defaults: *#987*99# Send
M100 software version: ####0000#
MX200 reset defaults: *#987*99# Send
MX200 software version: *#900# Send
MP500 reset defaults: *#987*99# Send
MP500 software version: *#900# Send
SL300m reset defaults: *#987*99# Send
SL300m software version: *#900# Send
SL500m reset defaults: *#987*99# Send
SL500m software version: *#900# Send
Set language to English: *#0044#
Set language to Russian: *#0007#
Engineer mode: *#110*01#
Enable COM port: *#110*01# -> Device -> Set UART -> PS Config -> UART1/115200
Factory mode: *#987#
LCD contrast: *#369#
Restore factory settings: *#987*99#
Software version: *#800#
Software version: *#900#
Set default language: *#0000# Send
Set English language: *#0044# Send
Set English language (new firmware): *#001# Send
Service codes Fly:
2040(i) reset defaults: *#987*99# Send
M100 software version: ####0000#
MX200 reset defaults: *#987*99# Send
MX200 software version: *#900# Send
MP500 reset defaults: *#987*99# Send
MP500 software version: *#900# Send
SL300m reset defaults: *#987*99# Send
SL300m software version: *#900# Send
SL500m reset defaults: *#987*99# Send
SL500m software version: *#900# Send
Set language to English: *#0044#
Set language to Russian: *#0007#
<>
Hyundai hwp-110 Nam Programming :
Nam Set: #86904**89397#
DM Mode: ##2740*
(Open phone, inter code, close phone)
Hyundai hgc-120, 130, 200 Nam Programming :
Nam Set: #86904**89397#
Hyundai hgc-310, 600, 610 Nam Programming :
Nam Set: ##20022002, end, 1, Spc Code
Field Test: ##20022002, end, 1, Master Code
Hyundai Curitel h100, 150, hx510b, 520, etc Nam Programming :
Nam Set: ##20022002, end, 1, Spc Code
Field Test: ##20022002, end, 1, Master Code
A-key: 2539**
Debug Menu: ##27732726, end
Sar Test: ##27752345, end
Baud Rate: ##36**, end
DM mode enable: **1004, end
DS mode enable: **1005, end
Test Bell/Voice/Led/Dot: ##1122, end
RF Mode: ##2240, end
Ras Ram: ##2774, end
Cmux1: **0481, end
Cmux2: **0482, end
RX Mode Fax: **0492, end
RX Mode Data: **0491, end
RX Mode Reset: **0490, end
Nam Set: #86904**89397#
DM Mode: ##2740*
(Open phone, inter code, close phone)
Hyundai hgc-120, 130, 200 Nam Programming :
Nam Set: #86904**89397#
Hyundai hgc-310, 600, 610 Nam Programming :
Nam Set: ##20022002, end, 1, Spc Code
Field Test: ##20022002, end, 1, Master Code
Hyundai Curitel h100, 150, hx510b, 520, etc Nam Programming :
Nam Set: ##20022002, end, 1, Spc Code
Field Test: ##20022002, end, 1, Master Code
A-key: 2539**
Debug Menu: ##27732726, end
Sar Test: ##27752345, end
Baud Rate: ##36**, end
DM mode enable: **1004, end
DS mode enable: **1005, end
Test Bell/Voice/Led/Dot: ##1122, end
RF Mode: ##2240, end
Ras Ram: ##2774, end
Cmux1: **0481, end
Cmux2: **0482, end
RX Mode Fax: **0492, end
RX Mode Data: **0491, end
RX Mode Reset: **0490, end
CDMA Secert Codes <>
Sony CM-M1300, 3300, Z200 Nam Programming :
Nam Set: 111111+Ok(Jog Dial)+Select+Programming+Ok+Spc
Nam Set: 111111+Ok(Jog Dial)+Select+Programming+Ok+Spc
CDMA Secert Codes <>
Lg LX,VX-series, VX4400, VX6000, etc Nam Programming :
Nam Set: ##Spc(#)
Nam Set: Menu, 0
Advanced Settings: ##2342(#)
Vocoder: ##8626337,ok(#)
CAI Change: ##7738,ok(#)
Enable TTY: ##889,ok(#)
A-key: ##2539,ok(#)
Reset (Life time, Clear Memory, etc): ##786,ok(#)
lgc-300, etc Nam Programming :
Nam Set: Menu, 9, Spc
A-key: Press "Sto" 3sec, 2539**
lgc-330w, etc Nam Programming :
Nam Set: Menu, 4, 0, Spc
A-key: 2539**
lgc-510, v111, etc Nam Programming :
Nam Set: Menu, 3, 0, Spc
A-key: 2539**
lgc-500, 800w, etc Nam Programming :
Nam Set: Menu, 9 , 0, Spc
Debug Mode: Menu, 7, 0, Fsc
Debug Mode: Menu, 8, 0, Fsc
A-key: 2539**
Nam Set: ##Spc(#)
Nam Set: Menu, 0
Advanced Settings: ##2342(#)
Vocoder: ##8626337,ok(#)
CAI Change: ##7738,ok(#)
Enable TTY: ##889,ok(#)
A-key: ##2539,ok(#)
Reset (Life time, Clear Memory, etc): ##786,ok(#)
lgc-300, etc Nam Programming :
Nam Set: Menu, 9, Spc
A-key: Press "Sto" 3sec, 2539**
lgc-330w, etc Nam Programming :
Nam Set: Menu, 4, 0, Spc
A-key: 2539**
lgc-510, v111, etc Nam Programming :
Nam Set: Menu, 3, 0, Spc
A-key: 2539**
lgc-500, 800w, etc Nam Programming :
Nam Set: Menu, 9 , 0, Spc
Debug Mode: Menu, 7, 0, Fsc
Debug Mode: Menu, 8, 0, Fsc
A-key: 2539**
<>
SonyEricsson T608, etc Nam Programming :
Nam Set: 923885, joystick >, 111111
Nam Set shot: 987, joystick >, 111111
Nam Set long: 222652, joystick >, 111111
Vocoder: ##8626337, joystick >, 111111
Debug screen: ##33284, joystick >
Life Timer: ##786, joystick >
SW ver: 9#4#3#, joystick >
Edit Profile: ##3282, joystick >
Service menu: *#06*
Ericsson A1228c, T61, etc Nam Programming :
Short NAM: 987+Menu
Long NAM: 923885+Menu+Spc
CDMA Mode: 904093+Menu
Analog Mode: 904095+Menu
QNC: 904097+Menu
Debug Screen: 904090+Menu
DM Mode: 904050+Menu
Nam Set: 923885, joystick >, 111111
Nam Set shot: 987, joystick >, 111111
Nam Set long: 222652, joystick >, 111111
Vocoder: ##8626337, joystick >, 111111
Debug screen: ##33284, joystick >
Life Timer: ##786, joystick >
SW ver: 9#4#3#, joystick >
Edit Profile: ##3282, joystick >
Service menu: *#06*
Ericsson A1228c, T61, etc Nam Programming :
Short NAM: 987+Menu
Long NAM: 923885+Menu+Spc
CDMA Mode: 904093+Menu
Analog Mode: 904095+Menu
QNC: 904097+Menu
Debug Screen: 904090+Menu
DM Mode: 904050+Menu
CDMA Secert Codes <>
Nokia 3280, 3285, 3580, 3585, 5185, 6185, 8280, etc Nam Programming :
Nam Set: *3001#12345#
Software Version: *#837#
Software Version: *#9999#
Esn Number: *#92772689#
Restart Phone: *#75681#
Restart Phone: *#75682#
Nokia 8887 Nam Programming :
Nam Set: *3001#12345#
Version: *#0000#
Evrc: *#8378#
Esn/Data/Timer: *#92772689#
SID: *#743#
Nokia 8587 Nam Programming :
Nam Set: *#626#7764726#
A-Key: #8159357022#4579# (26 digits)
A-Key: #8159357022#4547# (20 digits)
Version: *#0000#
Version: *#837#
Vocoder: *#3872#
Change language: Menu 5, 3, 1
Change DM mode: *#7678#
Debug Screen: *#8378#
Debug: *#8380#
Field Test Menu: *#83788#
SPC Unlock, Factory Reset :
Full Factory Reset: *#7370#
Resets all settings including non-user changeable items (like SPC)
NOKIA TEST MODE:
51xx, 61xx, 71xx, 3285, 63xx, etc :
1) Turn on the phone. Press *3001#12345#
2) Scroll up to where it says "Field Test" and choose SELECT
3) Highlight "Enable" and choose OK. Turn the phone off then back on.
4) If the test mode screen does not show up press MENU and scroll
down to "Field Test" choose SELECT. Press 0 1 then choose OK.
5) Lower left or upper left number is the signal strength.
6) To turn off the test mode press MENU and scroll down to where it says
"Field Test" choose SELECT. Press 0 0 and then choose OK.
3360, 6360, etc :
1) Turn on the phone. Press *3001#12345#
2) Scroll up to where it says "Field Test" and choose SELECT
3) Highlight "Enable" and choose OK. Turn the phone off then back on.
4) If the test mode screen does not show up press MENU and scroll
down to "Field Test" choose SELECT. Press 2 1 0 1 then choose OK.
5) Lower left or upper left number is the signal strength.
6) To turn off the test mode press MENU and scroll down to where it says
"Field Test" choose SELECT. Press 2 1 0 0 and then choose OK.
Nam Set: *3001#12345#
Software Version: *#837#
Software Version: *#9999#
Esn Number: *#92772689#
Restart Phone: *#75681#
Restart Phone: *#75682#
Nokia 8887 Nam Programming :
Nam Set: *3001#12345#
Version: *#0000#
Evrc: *#8378#
Esn/Data/Timer: *#92772689#
SID: *#743#
Nokia 8587 Nam Programming :
Nam Set: *#626#7764726#
A-Key: #8159357022#4579# (26 digits)
A-Key: #8159357022#4547# (20 digits)
Version: *#0000#
Version: *#837#
Vocoder: *#3872#
Change language: Menu 5, 3, 1
Change DM mode: *#7678#
Debug Screen: *#8378#
Debug: *#8380#
Field Test Menu: *#83788#
SPC Unlock, Factory Reset :
Full Factory Reset: *#7370#
Resets all settings including non-user changeable items (like SPC)
NOKIA TEST MODE:
51xx, 61xx, 71xx, 3285, 63xx, etc :
1) Turn on the phone. Press *3001#12345#
2) Scroll up to where it says "Field Test" and choose SELECT
3) Highlight "Enable" and choose OK. Turn the phone off then back on.
4) If the test mode screen does not show up press MENU and scroll
down to "Field Test" choose SELECT. Press 0 1 then choose OK.
5) Lower left or upper left number is the signal strength.
6) To turn off the test mode press MENU and scroll down to where it says
"Field Test" choose SELECT. Press 0 0 and then choose OK.
3360, 6360, etc :
1) Turn on the phone. Press *3001#12345#
2) Scroll up to where it says "Field Test" and choose SELECT
3) Highlight "Enable" and choose OK. Turn the phone off then back on.
4) If the test mode screen does not show up press MENU and scroll
down to "Field Test" choose SELECT. Press 2 1 0 1 then choose OK.
5) Lower left or upper left number is the signal strength.
6) To turn off the test mode press MENU and scroll down to where it says
"Field Test" choose SELECT. Press 2 1 0 0 and then choose OK.
CDMA Secert Codes <>
Motorola 7760, 7860, 2260, 8160, etc Nam Programming :
Nam Set: Fcn,0000000000000, Rcl
Nam Set: 74663#, Fcn, Fcn
Test Mode: Fcn, 00**83786633, Sto
Motorola v60c, v120c etc Nam Programming :
Nam Set: 74663#, Menu, Menu, Spc
Nam Set: Menu, 073887, * (type quickly)
Test Mode: Menu, 073887*, Spc
Debug Mode: ##33284
Force the phone into DIGITAL ONLY mode:
1) ##33284 (Debug)
2) RIGHT Softkey (Next) Twice
3) Down arrow 10 times to "PrefMod"
4) RIGHT Softkey (Change) until you see "DigOnly"
5) LEFT softkey (Exit)
6) MENU then LEFT Softkey return to idle screen
7) ##33284 (The last 4 will not display if you have done it correctly)
Motorola Razr V3C Nam Programming:
Nam Set: 74663 # clr clr
Nam Set: #073887* , then SPC
Motorola Q Nam Programming:
Nam Set: [Send] + 074663 + [Send] + [Send], Selecct NAM#
Motorola t182, c210, etc Nam Programming :
Nam Set: ##298645665, end
Short Nam: ##073887, sto
Debug Menu: ##1111, end
Service Menu: ##2222, end
Sound NS/EC on/off switch: ##1113, end
Motorola v710, v730, v740, ms150, etc Nam Programming :
Nam Set: 8378*# + press 3 times NATE (spc - 071082)
Test Mode: Menu, 073887*, Spc
Service Menu: #758353266#646#
Motorola StarTac 2004 Nam Programming :
Nam Set: 5759789*#, press "Rec" button 3 times, (spc - 915037)
Motorola ms200, ms400, ms800, etc Nam Programming :
Nam Set: 5759789*#, press "Camera" button 3 times, (spc - 915037)
Nam Set: 246791538*#, press "Camera" button 3 times, (spc - 915037)
Motorola v6060 Nam Programming :
Nam Set:147*369#456*0#
MOTOROLA TEST MODE :
v60, c120, c331, etc:
1) Turn on the phone. Press MENU 0 7 3 8 8 7 *
2) The phone will require you to "Enter a Security Code", press 000000, OK
3) Scroll down to "Test mode" choose SELECT. Scroll down to "Enable"
choose SELECT. Your phone is now in test mode.
4) Signal strength is the 3_rd number down on the left hand side of the screen.
5) To toggle between regular mode and test mode: Press MODE then
quickly press the BUTTON DIRECTLY TO THE LEFT OF MENU.
6) To turn off the test mode the phone must be in regular mode, then follow
the above sequence and scroll down to where it says "DISABLE" instead of
"ENABLE" and choose select.
Nam Set: Fcn,0000000000000, Rcl
Nam Set: 74663#, Fcn, Fcn
Test Mode: Fcn, 00**83786633, Sto
Motorola v60c, v120c etc Nam Programming :
Nam Set: 74663#, Menu, Menu, Spc
Nam Set: Menu, 073887, * (type quickly)
Test Mode: Menu, 073887*, Spc
Debug Mode: ##33284
Force the phone into DIGITAL ONLY mode:
1) ##33284 (Debug)
2) RIGHT Softkey (Next) Twice
3) Down arrow 10 times to "PrefMod"
4) RIGHT Softkey (Change) until you see "DigOnly"
5) LEFT softkey (Exit)
6) MENU then LEFT Softkey return to idle screen
7) ##33284 (The last 4 will not display if you have done it correctly)
Motorola Razr V3C Nam Programming:
Nam Set: 74663 # clr clr
Nam Set: #073887* , then SPC
Motorola Q Nam Programming:
Nam Set: [Send] + 074663 + [Send] + [Send], Selecct NAM#
Motorola t182, c210, etc Nam Programming :
Nam Set: ##298645665, end
Short Nam: ##073887, sto
Debug Menu: ##1111, end
Service Menu: ##2222, end
Sound NS/EC on/off switch: ##1113, end
Motorola v710, v730, v740, ms150, etc Nam Programming :
Nam Set: 8378*# + press 3 times NATE (spc - 071082)
Test Mode: Menu, 073887*, Spc
Service Menu: #758353266#646#
Motorola StarTac 2004 Nam Programming :
Nam Set: 5759789*#, press "Rec" button 3 times, (spc - 915037)
Motorola ms200, ms400, ms800, etc Nam Programming :
Nam Set: 5759789*#, press "Camera" button 3 times, (spc - 915037)
Nam Set: 246791538*#, press "Camera" button 3 times, (spc - 915037)
Motorola v6060 Nam Programming :
Nam Set:147*369#456*0#
MOTOROLA TEST MODE :
v60, c120, c331, etc:
1) Turn on the phone. Press MENU 0 7 3 8 8 7 *
2) The phone will require you to "Enter a Security Code", press 000000, OK
3) Scroll down to "Test mode" choose SELECT. Scroll down to "Enable"
choose SELECT. Your phone is now in test mode.
4) Signal strength is the 3_rd number down on the left hand side of the screen.
5) To toggle between regular mode and test mode: Press MODE then
quickly press the BUTTON DIRECTLY TO THE LEFT OF MENU.
6) To turn off the test mode the phone must be in regular mode, then follow
the above sequence and scroll down to where it says "DISABLE" instead of
"ENABLE" and choose select.
CDMA Secert Codes <>
Sanyo 4900, 5150, 5300, 8100, etc Nam Programming :
Nam Set: ##Spc+Ok+Key Down+Ok
Advanced Setup: ##3282+Ok+Key Down+Ok+Msl
A-key: ##2539+Ok+Key Down+Ok
Version: ##**837+Ok+Key Down+Ok
Debug Menu: ##FSC+Ok+Key Down+Ok
Airtime menu: ##8463+Ok+Key Down+Ok
Change CAI: ##7738+Ok+Key Down+Ok
Vocoder: ##8626337+Ok+Key Down+Ok
Reverse Logistic: ##786+Ok+Key Down+Ok
Set IP Address: ##2769737+Ok+Key Down+Ok
TTY On/Off: ##889+Ok+Key Down+Ok
Ready Link: ##4636+Ok+Key Down+Ok
Browser Init On/Off: ##4682+Ok+Key Down+Ok
Picture Token: ##25327+Ok+Key Down+Ok
Unknown Code: ##5282277+Ok+Key Down+Ok
(SPC=000000, FSC=040793)
Sanyo scp-A011, smp-A017, etc Nam Programming :
Nam Set: F9(3 beep) + 0*72696#767
Nam Set: ##Spc+Ok+Key Down+Ok
Advanced Setup: ##3282+Ok+Key Down+Ok+Msl
A-key: ##2539+Ok+Key Down+Ok
Version: ##**837+Ok+Key Down+Ok
Debug Menu: ##FSC+Ok+Key Down+Ok
Airtime menu: ##8463+Ok+Key Down+Ok
Change CAI: ##7738+Ok+Key Down+Ok
Vocoder: ##8626337+Ok+Key Down+Ok
Reverse Logistic: ##786+Ok+Key Down+Ok
Set IP Address: ##2769737+Ok+Key Down+Ok
TTY On/Off: ##889+Ok+Key Down+Ok
Ready Link: ##4636+Ok+Key Down+Ok
Browser Init On/Off: ##4682+Ok+Key Down+Ok
Picture Token: ##25327+Ok+Key Down+Ok
Unknown Code: ##5282277+Ok+Key Down+Ok
(SPC=000000, FSC=040793)
Sanyo scp-A011, smp-A017, etc Nam Programming :
Nam Set: F9(3 beep) + 0*72696#767
<>
Audiovox 4000, 9000, 9100, 9155, 9500, etc Nam Programming :
Power the phone ON and wait until the little light on top goes out, then press:
Nam Set: 289,Fcn, #,1
Service menu: Fcn,0,0, FSC
Power the phone ON and press:
Test Mode: Hold (2,*,Rcl) + Power
Test Mode Commands:
99 - download - flash phone
124 - inam data write
125 - version
126 - get ESN
127 - get SPC
128 - get User lock
129 - is WFTV data write
137 - get FSC code
138 - NPcode (nam program code)
139 - dscode
141 - restart
218 - Read_Addr
000 - is cdma mode
001 - is fm mode
002 - is pcs mode
008 - is reg read addr
020 - is lna_range
Audiovox (Hyundai) cdm-100, 130, 135, 8300, 8500, 8600, 8910, etc Nam Programming :
Nam Set: ##20022002, end
Read user lock: #5625*, end
Port settings: ##7678, end
DM baud rate: ##2283, end
DM mode enable: **1004, end
DS mode enable: **1005, end
Misc. Test: ##27752345, end
S/W Test1: ##27732726, end
S/W Test2: ##2240, end
Debug screen: ##2773, end
Clear MRU: ##6782, end
Rfnu_Contents: ##2250, end
?????: ##1133, end
?????: ##1144, end
P_Rev: ##7738, end
GPS Test: ##4771, end
A-Key: 2538**
SMS Eng: ##767364, end
Battery_adc: ##2768, end
Tests: ##1122, end
Audiovox 8610, 8910, etc Nam programming :
Name Set: ##847446, end, 111111
Audiovox pcx-3500xl Nam Programming :
Nam Set: ##2726+Send+1998+1+Spc+1
Audiovox-107 Nam Programming :
Nam Set: 45680*47*869#1
Audiovox CMP-3 Nam Programming :
Nam Set: 45680*47*869#1
Dm Mode: Menu, 6, 6
Audiovox 9950 Nam Programming :
Nam Set: ##3282
Audiovox Z800 (Audiovox 7900, Sharp) Nam Programming :
Nam Set: m + # + envelope key + * + 1
Audiovox Thera (Toshiba 2032) Nam Programming :
Thera Nam Programming User Manual - nam_thera.pdf
Audiovox (UTStarcom) PPC 6600, 6700, etc Nam Programming :
Nam Set: ##SPC + Send
Nam Set: #*#SPC + Send
Nam Set: ##SPC#
DM mode: ##3424 + Send
DM mode: #*#3424 + Send
DM mode: ##3424#
Programming User Manual - programming_instructions.pdf
Power the phone ON and wait until the little light on top goes out, then press:
Nam Set: 289,Fcn, #,1
Service menu: Fcn,0,0, FSC
Power the phone ON and press:
Test Mode: Hold (2,*,Rcl) + Power
Test Mode Commands:
99 - download - flash phone
124 - inam data write
125 - version
126 - get ESN
127 - get SPC
128 - get User lock
129 - is WFTV data write
137 - get FSC code
138 - NPcode (nam program code)
139 - dscode
141 - restart
218 - Read_Addr
000 - is cdma mode
001 - is fm mode
002 - is pcs mode
008 - is reg read addr
020 - is lna_range
Audiovox (Hyundai) cdm-100, 130, 135, 8300, 8500, 8600, 8910, etc Nam Programming :
Nam Set: ##20022002, end
Read user lock: #5625*, end
Port settings: ##7678, end
DM baud rate: ##2283, end
DM mode enable: **1004, end
DS mode enable: **1005, end
Misc. Test: ##27752345, end
S/W Test1: ##27732726, end
S/W Test2: ##2240, end
Debug screen: ##2773, end
Clear MRU: ##6782, end
Rfnu_Contents: ##2250, end
?????: ##1133, end
?????: ##1144, end
P_Rev: ##7738, end
GPS Test: ##4771, end
A-Key: 2538**
SMS Eng: ##767364, end
Battery_adc: ##2768, end
Tests: ##1122, end
Audiovox 8610, 8910, etc Nam programming :
Name Set: ##847446, end, 111111
Audiovox pcx-3500xl Nam Programming :
Nam Set: ##2726+Send+1998+1+Spc+1
Audiovox-107 Nam Programming :
Nam Set: 45680*47*869#1
Audiovox CMP-3 Nam Programming :
Nam Set: 45680*47*869#1
Dm Mode: Menu, 6, 6
Audiovox 9950 Nam Programming :
Nam Set: ##3282
Audiovox Z800 (Audiovox 7900, Sharp) Nam Programming :
Nam Set: m + # + envelope key + * + 1
Audiovox Thera (Toshiba 2032) Nam Programming :
Thera Nam Programming User Manual - nam_thera.pdf
Audiovox (UTStarcom) PPC 6600, 6700, etc Nam Programming :
Nam Set: ##SPC + Send
Nam Set: #*#SPC + Send
Nam Set: ##SPC#
DM mode: ##3424 + Send
DM mode: #*#3424 + Send
DM mode: ##3424#
Programming User Manual - programming_instructions.pdf
CDMA Secert Codes <>
Kyocera 2345, 3035, 5135, 6035, Se47, KX, KE - series, etc Nam Programming :
Nam Set: 111111+Jog Dial(Ok)
CAI Change: ##7738,ok
Enable TTY: ##889,ok
Life Timer: ##786,ok
A-key: ##2539,ok
Tips:
On some kyocera handsets the factory service module has not been disabled
and the phone can be programmed without the Spc by inputting:
Nam Set: ##333333 menu (service)
Qualcomm qcp-800 Nam Pogramming :
Nam Set: Menu+3+0+Spc
Field Test: Menu+7+0+Fsc
Nam Set: 111111+Jog Dial(Ok)
CAI Change: ##7738,ok
Enable TTY: ##889,ok
Life Timer: ##786,ok
A-key: ##2539,ok
Tips:
On some kyocera handsets the factory service module has not been disabled
and the phone can be programmed without the Spc by inputting:
Nam Set: ##333333 menu (service)
Qualcomm qcp-800 Nam Pogramming :
Nam Set: Menu+3+0+Spc
Field Test: Menu+7+0+Fsc
CDMA Secert Codes <>
Samsung sph-n240, n400, a460, a500, etc Nam Programming :
Nam Set: ##Spc
Test Mode: 47*869#1235
Debug Menu: ##33284,ok
Service Menu: Menu+8+0 (#889)
Reset (Life time, Clear Memory, etc): ##786,ok
A-key: ##2539,ok
Label Selection: ##3882,ok
Label(Home, Work, etc) : **523,ok
NGG Setting (Gateway, etc.): ##2769737,ok
Vocoder: ##8626337,ok
CAI Change: ##7738,ok
Enable TTY: ##889,ok
Samsung a530, a610, a620, a660, a670, etc Nam Programming :
Nam Set: Menu, 6, *
Nam Set: ##3238, ok
Nam Set: ##SPC (##000000), ok
Service Menu: Menu, 9, *
Test Mode: 47*68#13580
Test Mode: 47*869#1235
Samsung X, E, V, S-series (korean models), e250, v420, s350, etc Nam Programming :
Nam Set: 6548#0**4#6
Nam Set: 47*869#08#9 --Activate Chachu Samsung S-106
Nam Set: 74153697193
Test Mode: 5809540*45680 (88 - EFS reset)
Debug Menu: Menu(hold 2sec)+0, 6725 or 9720 or 1973 or 0415
Debug Menu: Menu+0(hold 2sec), 6725 or 9720 or 1973 or 0415
Debug Menu: Home(top of keypad)+0, 6725 or 9720 or 1973 or 0415
Samsung sch-411, 611, n105, a100, a300, a2000, etc Nam Programming :
Nam Set: 47*869#08#9
Nam Set: Menu+60
Test Mode: *759#813580
Test Mode: 5809540*45680
A-key: Menu+0, 25##
External Audio: Menu+0, ####
Debug Menu: Menu+8, 0415 or Spc
Debug Menu: Menu+9, 0415 or Spc
Brief NAM Programing: Menu+40,626 (not all version)
LCD Contrast: Menu+45 (not all version)
SIO Mode: Menu+49
SIO Mode: Menu+69
Samsung N356 (India version) Nam Programming :
Test Mode: Menu, 5, down arrow, *
Test Mode: **00## (in some flashes)
Samsung i700, etc Nam Programming :
Nam Set: Go to start and select "PHONE" from the drop down menu, dial #83587
Samsung i300, etc Nam Programming :
1. Tap on the Phone Icon with stylus
2. Press #907*9#0 ENTER LOCK should appear on screen
3. Enter OTKSL
4. SVC MENU will appear press 1
5. Enter 10 digit MIN and then press SAVE
6. Press SAVE again
7. Press 3 and then press SAVE 6 times
8. Enter the HOME SID and press SAVE once
9. Press END key twice
Nam Set: ##Spc
Test Mode: 47*869#1235
Debug Menu: ##33284,ok
Service Menu: Menu+8+0 (#889)
Reset (Life time, Clear Memory, etc): ##786,ok
A-key: ##2539,ok
Label Selection: ##3882,ok
Label(Home, Work, etc) : **523,ok
NGG Setting (Gateway, etc.): ##2769737,ok
Vocoder: ##8626337,ok
CAI Change: ##7738,ok
Enable TTY: ##889,ok
Samsung a530, a610, a620, a660, a670, etc Nam Programming :
Nam Set: Menu, 6, *
Nam Set: ##3238, ok
Nam Set: ##SPC (##000000), ok
Service Menu: Menu, 9, *
Test Mode: 47*68#13580
Test Mode: 47*869#1235
Samsung X, E, V, S-series (korean models), e250, v420, s350, etc Nam Programming :
Nam Set: 6548#0**4#6
Nam Set: 47*869#08#9 --Activate Chachu Samsung S-106
Nam Set: 74153697193
Test Mode: 5809540*45680 (88 - EFS reset)
Debug Menu: Menu(hold 2sec)+0, 6725 or 9720 or 1973 or 0415
Debug Menu: Menu+0(hold 2sec), 6725 or 9720 or 1973 or 0415
Debug Menu: Home(top of keypad)+0, 6725 or 9720 or 1973 or 0415
Samsung sch-411, 611, n105, a100, a300, a2000, etc Nam Programming :
Nam Set: 47*869#08#9
Nam Set: Menu+60
Test Mode: *759#813580
Test Mode: 5809540*45680
A-key: Menu+0, 25##
External Audio: Menu+0, ####
Debug Menu: Menu+8, 0415 or Spc
Debug Menu: Menu+9, 0415 or Spc
Brief NAM Programing: Menu+40,626 (not all version)
LCD Contrast: Menu+45 (not all version)
SIO Mode: Menu+49
SIO Mode: Menu+69
Samsung N356 (India version) Nam Programming :
Test Mode: Menu, 5, down arrow, *
Test Mode: **00## (in some flashes)
Samsung i700, etc Nam Programming :
Nam Set: Go to start and select "PHONE" from the drop down menu, dial #83587
Samsung i300, etc Nam Programming :
1. Tap on the Phone Icon with stylus
2. Press #907*9#0 ENTER LOCK should appear on screen
3. Enter OTKSL
4. SVC MENU will appear press 1
5. Enter 10 digit MIN and then press SAVE
6. Press SAVE again
7. Press 3 and then press SAVE 6 times
8. Enter the HOME SID and press SAVE once
9. Press END key twice
Thursday, September 25, 2008
About "HOSTS" File
Warning: Backup the file before playing with it!
What does this file do?
The HOSTS file found on Windows (and linux too) is like a local DNS (domain name server). When you type a url on the browsers address bar, the domain name is converted to the IP of the server by a DNS lookup by the browser. Now here is the catch ... Windows first looks at the HOSTS file before doing any DNS lookup. So we can block certain sites by editing the HOSTS file.
Where is it ? I dont see the HOSTS file
HOSTS file is found typically here ...
Windows XP : C:\WINDOWS\SYSTEM32\DRIVERS\ETC
Windows 2K : C:\WINNT\SYSTEM32\DRIVERS\ETC
Windows 98/ME : C:\WINDOWS
Linux : /etc/
What is in this FILE?
HOSTS file is just a plain text file. So you can use any text editing software like notepad to edit the contents of the file.
Typical content of a HOSTS file is shown below :
# Copyright (c) 1993-1999 Microsoft Corp.
#
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
#
# This file contains the mappings of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address should
# be placed in the first column followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
# space.
#
# Additionally, comments (such as these) may be inserted on individual
# lines or following the machine name denoted by a '#' symbol.
#
# For example:
#
# 102.54.94.97 rhino.acme.com # source server
# 38.25.63.10 x.acme.com # x client host
127.0.0.1 localhost
The Lines followed by a # are comments and explains how to use the HOSTS file. 127.0.0.1 is the IP address that is used to loopback to your computer itself. So if you are running an apache or IIS server or anyother server software, you can access it by the url http://localhost or http://127.0.0.1
What now ?
Suppose you want to block some sites for example say you want to block "www.sicksite.com". All you have to do is add another line to the HOSTS file:
127.0.0.1 www.sicksite.com
Now what happens is whenever you try to visit "www.sicksite.com" it goes to the site on your localhost. For common people those who dont run any server, localhost is nowhere!
Why would i want to block sites ?
There are many parasitic servers out there on the internet, that track your movements while browsing. So if you want to protect yourself, include those sites on the HOSTS file.
A list of sites that is parasitic or is an ad serving site is given in
http://www.mvps.org/winhelp2002/hosts.txt
It is not recommended to copy the entire list to your local HOSTS file as it slows down the system. So choose ones that you think needs to be blocked.
What is this pop up about?
When you are saving the HOSTS file, a pop up may appear that asks you to confirm the changes to the HOSTS file. This pop up may or may not appear based on the OS, and other Anti-Virus Softwares you are running.
What else can I do with "HOSTS" file?
You can also make a site point to another site. By making an entry as follows :
72.14.207.99 www.mysearchengine.com #72.14.207.99 google server ip
Now visiting "www.mysearchengine.com" takes you yo "www.google.com".
To find out IP address of sites visit:
• http://www.hcidata.co.uk/host2ip.htm
• http://cqcounter.com/whois/
If your are a webmaster, HOSTS file allows you to make subdomains within localhost (depends on server software and after configurations in it).
127.0.0.1 subdomain.localhost
Oops I screwed up ...
Restore the backup file if u have already done so
OR
Copy the sample HOSTS given above and save it.
What does this file do?
The HOSTS file found on Windows (and linux too) is like a local DNS (domain name server). When you type a url on the browsers address bar, the domain name is converted to the IP of the server by a DNS lookup by the browser. Now here is the catch ... Windows first looks at the HOSTS file before doing any DNS lookup. So we can block certain sites by editing the HOSTS file.
Where is it ? I dont see the HOSTS file
HOSTS file is found typically here ...
Windows XP : C:\WINDOWS\SYSTEM32\DRIVERS\ETC
Windows 2K : C:\WINNT\SYSTEM32\DRIVERS\ETC
Windows 98/ME : C:\WINDOWS
Linux : /etc/
What is in this FILE?
HOSTS file is just a plain text file. So you can use any text editing software like notepad to edit the contents of the file.
Typical content of a HOSTS file is shown below :
# Copyright (c) 1993-1999 Microsoft Corp.
#
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
#
# This file contains the mappings of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address should
# be placed in the first column followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
# space.
#
# Additionally, comments (such as these) may be inserted on individual
# lines or following the machine name denoted by a '#' symbol.
#
# For example:
#
# 102.54.94.97 rhino.acme.com # source server
# 38.25.63.10 x.acme.com # x client host
127.0.0.1 localhost
The Lines followed by a # are comments and explains how to use the HOSTS file. 127.0.0.1 is the IP address that is used to loopback to your computer itself. So if you are running an apache or IIS server or anyother server software, you can access it by the url http://localhost or http://127.0.0.1
What now ?
Suppose you want to block some sites for example say you want to block "www.sicksite.com". All you have to do is add another line to the HOSTS file:
127.0.0.1 www.sicksite.com
Now what happens is whenever you try to visit "www.sicksite.com" it goes to the site on your localhost. For common people those who dont run any server, localhost is nowhere!
Why would i want to block sites ?
There are many parasitic servers out there on the internet, that track your movements while browsing. So if you want to protect yourself, include those sites on the HOSTS file.
A list of sites that is parasitic or is an ad serving site is given in
http://www.mvps.org/winhelp2002/hosts.txt
It is not recommended to copy the entire list to your local HOSTS file as it slows down the system. So choose ones that you think needs to be blocked.
What is this pop up about?
When you are saving the HOSTS file, a pop up may appear that asks you to confirm the changes to the HOSTS file. This pop up may or may not appear based on the OS, and other Anti-Virus Softwares you are running.
What else can I do with "HOSTS" file?
You can also make a site point to another site. By making an entry as follows :
72.14.207.99 www.mysearchengine.com #72.14.207.99 google server ip
Now visiting "www.mysearchengine.com" takes you yo "www.google.com".
To find out IP address of sites visit:
• http://www.hcidata.co.uk/host2ip.htm
• http://cqcounter.com/whois/
If your are a webmaster, HOSTS file allows you to make subdomains within localhost (depends on server software and after configurations in it).
127.0.0.1 subdomain.localhost
Oops I screwed up ...
Restore the backup file if u have already done so
OR
Copy the sample HOSTS given above and save it.
Disable Autorun Windows XP
Do this very important!!
Most viruses uses the autorun.inf to get itself infected on your computer. Autorun.inf is a small file that instructs the windows os to do when the CD is inserted into the computer. In genuine cases , it runs a setup in case of a Software Installation Disc. In the other case it may run a virus and gets your system infected. All you got to do to get the virus is put the CD. Same is the case for Mass Storage Devices like Memory Sticks, Pen Drives, Flash Drives etc.
So Disable your Autorun now
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\
Services\Cdrom\Autorun Change from 1 to 0
To disable Autoplay of all drives
Start > Run > gpedit.msc
Enable : Computer Configuration > Administrative Templates > System > Turn Off Autoplay
Most viruses uses the autorun.inf to get itself infected on your computer. Autorun.inf is a small file that instructs the windows os to do when the CD is inserted into the computer. In genuine cases , it runs a setup in case of a Software Installation Disc. In the other case it may run a virus and gets your system infected. All you got to do to get the virus is put the CD. Same is the case for Mass Storage Devices like Memory Sticks, Pen Drives, Flash Drives etc.
So Disable your Autorun now
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\
Services\Cdrom\Autorun Change from 1 to 0
To disable Autoplay of all drives
Start > Run > gpedit.msc
Enable : Computer Configuration > Administrative Templates > System > Turn Off Autoplay
Windows XP Hotfixes
KB873339 - Vulnerability in HyperTerminal could allow code execution
KB884575 - Battery power may be drained more quickly than expected on Windows XP-based laptop
KB885836 - Vulnerability in WordPad could allow code execution
KB886677 - DBCS characters appear corrupted when browsing site using Shift-JIS encoding
KB887472 - Security update to Microsoft Windows Messenger
KB887606 - Microsoft XML Parser (MSXML) uses cached credentials incorrectly
KB888111 - Universal Audio Architecture High Definition Audio Class Driver Version 1.0a
KB889016 - Cannot obtain debug information about the resource objects of Application Verifier stop errors
KB889320 - Computer Browser service stops and Event ID 7023 is logged after Windows Firewall service disabled
KB889673 - DEP-enabled computer may unexpectedly quit after resuming from standby or hibernation
KB890830 - Malicious Software Removal Tool 1.30
KB892489 - Antivirus scan may increase the number of open handles for the svchost.exe process
KB893008 - PAL format digital video cameras are incorrectly detected as NTSC format digital video cameras
KB893756 - Vulnerability in Telephony service could allow remote code execution
KB893803 - Windows Installer 3.1 (v2)
KB894395 - IME Composition or Candidate window remains visible even after losing focus when using Japanese IME
KB895961 - Terminal Server Service update (From KB900325 Package)
KB896256 - A Windows XP SP2-based computer that has multiple processors exhibits decreased performance or unexpected behavior
KB896344 - Can't transfer files and settings from computer running 32-bit Windows XP to computer running Windows XP x64
KB896358 - Vulnerability in HTML Help could allow remote code execution
KB896423 - Vulnerability in Print Spooler service could allow remote code execution
KB896428 - Vulnerability in Telnet client could allow information disclosure
KB896626 - Windows XP TV tuner program stops responding or displays corrupted video
KB897338 - New language locales for Windows XP Service Pack 2
KB897663 - Exception may not show up in the Windows Firewall GUI the exception is created by modifying the registry
KB898461 - Permanent copy of the Package Installer for Windows version 6.2.29.0
KB898543 - Cannot correctly install security fixes in Windows XP Starter Edition
KB899271 - Updated USB Video Class (UVC) driver for Windows XP
KB899409 - 20-second delay when trying to access a redirected folder by logging on to computer
KB899591 - Vulnerability in Remote Desktop Protocol could allow denial of service
KB900485 - 0x0000007E stop error in Windows XP SP2
KB901017 - Vulnerability in the Microsoft Collaboration Data Objects could allow code execution
KB901190 - Vulnerability in the Korean Input Method Editor (IME) could allow elevation of privilege
KB901214 - Vulnerability in Microsoft Color Management Module could allow remote code execution
KB902149 - FTP client may echo account information back to the screen
KB902845 - Computer stops responding during text-mode Setup when you try to install Windows XP
KB902853 - An unnecessary restore operation may be started on a RAID group when computer is put in hibernation
KB903234 - Update to optimize the way that the Volume Shadow Copy Service client accesses shadow copies
KB903250 - Song titles are copied to a recordable CD after cancelling a burn operation in Windows Media Player 10
KB904412 - SBP-2 device does not work when it is connected to a Windows XP SP2-based computer
KB905414 - Vulnerability in Network Connection Manager could allow denial of service
KB905749 - Vulnerability in Plug and Play could allow remote code execution and local elevation of privilege
KB906216 - The Dhtmled.ocx ActiveX control doesn't work as expected after a program changes the Visible property of it
KB906569 - Update to add the Tools tab to the System Configuration utility in Windows XP Service Pack 2
KB906866 - 0x00000035 NO_MORE_IRP_STACK_LOCATIONS stop error when trying to log on to a domain
KB907865 - IPSec Policy Agent update
KB908519 - Vulnerability in embedded Web fonts could allow remote code execution
KB908531 - Vulnerability in Windows Explorer Could Lead to Remote Code Execution
KB908536 - Horizontal scroll bar used in forms may not respond to mouse controls or actions when using themes
KB909441 - In Control Panel, "Sounds and Audio Devices" does not correctly display the setting in "Speaker Setup" list
KB909520 - Software update for Base Smart Card Cryptographic Service Provider
KB909608 - Access violation when using /integrate switch to integrate KB900725 into Windows XP SP2 installation source files
KB909667 - Computer stops responding during standby or hibernation operations or trying to use the Shut Down command
KB910437 - Access violation error occurs when Windows Automatic Updates tries to download updates
KB911280 - Vulnerability in Routing and Remote Access could allow remote code execution
KB911562 - Vulnerability in Microsoft Data Access Components (MDAC) function could allow code execution
KB911564 - Vulnerability in Windows Media Player plug-in with non-Microsoft Internet browsers could allow remote code
execution
KB911927 - Vulnerability in WebClient could allow remote code execution
KB911990 - Connection to the Sony Media Changer/Recorder is lost
KB912024 - Update Rollup 2 for eHome Infrared Receiver
KB912461 - Cannot obtain information about specific events when you program against the DVD Nav control in Windows XP
KB913296 - Jet 4.0 data engine update fixes issues that may occur
KB913580 - Vulnerability in Microsoft Distributed Transaction Coordinator could allow denial of service
KB913808 - The embedded resource version of the LIP MUI files is incorrect in Windows XP
KB914388 - Vulnerability in the DHCP Client Service could allow remote code execution
KB914440 - Network Diagnostics for Windows XP
KB914463 - WMI causes object access failure events when an SACL is applied to the HKEY_USERS registry subkey
KB914841 - Simplify the creation and maintenance of Internet Protocol security filters
KB914906 - "Unsupported State(2)" error message when a Windows XP Starter Edition-based computer continuously restarts
KB915378 - Update for Add New Hardware Control Panel
KB915865 - XmlLite update package for Windows XP Service Pack 2
KB916595 - 0x000000D1 DRIVER_IRQL_NOT_LESS_OR_EQUAL stop error on a Windows XP SP2 computer
KB917140 - Microsoft Application Compatibility Toolkit detailed log entries cannot be logged
KB917275 - Windows Rights Management Services for Windows XP SP2
KB917730 - You cannot create a network connection when you are starting a Windows XP SP2-based computer
KB918005 - Battery power may drain more quickly than you expect on a Windows XP SP2-based portable computer
KB918033 - Certain Windows dialog boxes may not retain the focus as expected
KB918118 - Vulnerability in Microsoft RichEdit could allow remote code execution
KB918334 - Error message when running a Win32 program that makes CreateFile function calls from a client computer to a server
KB918439 - Vulnerability in ART image rendering could allow remote code execution
KB918997 - Developers can't create wireless client programs that manage wireless profiles and connections over the Wireless
Zero Configuration service
KB919007 - Vulnerability in Pragmatic General Multicast (PGM) could result in remote code execution
KB920213 - Vulnerability in Microsoft Agent could allow remote code execution
KB920342 - Upgrade PNRP to PNRP version 2.0
KB920670 - Vulnerabilities in Microsoft Windows Hyperlink Object Library could allow remote code execution
KB920683 - Vulnerability in DNS resolution could allow remote code execution
KB920685 - Vulnerability in Indexing Service could allow cross-site scripting
KB920872 - Audio playback does not play file from correct position after pausing, and Stop error message randomly received
when trying to play audio files
KB921401 - A non-paged pool memory leak occurs when you capture specific MIDI SYSEx messages in Windows XP
KB921411 - USB devices no longer work correctly after installing the Intel Chipset Software Installation Utility
KB922120 - Network Map in Windows Vista does not display computers that are running Windows XP
KB922582 - 0x80070002 error message when trying to update a Microsoft Windows-based computer
KB922668 - Windows XP COM+ Hotfix Rollup Package 14
KB922819 - Vulnerabilities in TCP/IP IPv6 could allow denial of service
KB923154 - EAP reauthentication may not occur and the Wireless Zero Configuration service may not work correctly when using a
third-party application
KB923191 - Vulnerability in Windows Explorer could allow remote code execution
KB923232 - Computer using Intel dual-core processor stops responding when trying to resume from standby
KB923414 - Vulnerability in Server Service could allow denial of service
KB923980 - Vulnerability in Client Service could allow remote code execution
KB924191 - Vulnerabilities in Microsoft XML Core Services could allow remote code execution
KB924270 - Vulnerability in Workstation Service could allow remote code execution
KB924667 - Vulnerability in Microsoft Foundation Classes could allow for remote code execution
KB924941 - Update to resolve timing issues resulting in race conditions when using Bluetooth devices connected via USB
KB925398 - Vulnerability in Windows Media Player 6.4 could allow remote code execution
KB925623 - The Wmiprvse.exe process may experience a memory leak when WMI services and RPC services are extensively used
KB925720 - Windows CardSpace hotfix rollup package
KB925876 - Remote Desktop Connection 6.0 Client
KB925902 - Vulnerability in GDI could allow remote code execution
KB925922 - Computer restarts unexpectedly or 0x000000D1 stop error message received
KB926239 - Windows Media Player 10 may close unexpectedly
KB926255 - Vulnerability in Windows could allow elevation of privilege
KB926436 - Vulnerability in Microsoft OLE Dialog could allow remote code execution
KB926646 - Can't increase the limit concurrent SMB command in the Windows XP Professional Server service
KB927544 - Can't create an AVI larger than 512GB and can't play an AVI larger than 800 GB using DirectX
KB927779 - Vulnerability in Microsoft Data Access Components could allow remote code execution
KB927802 - Vulnerability in Windows Image Acquisition Service could allow elevation of privilege
KB927880 - Can't log on to a device that has both a blank user name and password using Internet Explorer 7
KB927891 - Access violation received when trying to install an update from Windows Update
KB928255 - Vulnerability in Windows Shell could allow elevation of privilege
KB929123 - Cumulative security update for Outlook Express (June, 2006)
KB929280 - Microsoft Management Console 3.0 does not correctly display 32-bit color snap-in icons
KB929969 - Vulnerability in Vector Markup Language could allow remote code execution
KB930178 - Vulnerability in Windows CSRSS could allow remote code execution
KB931125 - Microsoft Root Certificate Update (February 2007)
KB931192 - Users in a trusted external Kerberos realm cannot access resources from a Windows Server 2003-based forest
KB931261 - Vulnerability in UPnP could allow remote code execution
KB931784 - Vulnerability in the Windows kernel could allow elevation of privilege
KB931836 - February 2007 cumulative time zone update
KB932168 - Vulnerability in Microsoft Agent could allow remote code execution
KB932590 - Windows-based applications that use the TZ environment variable may not work as expected because of changes to DST
KB932597 - "Windows cannot find the network path" error message when trying to connect to a network resource
KB932662 - An access violation occurs in a program that uses the DirectShow DV Mux filter
KB933566 - Cumulative Security Update for Internet Explorer (June, 2007)
KB933876 - USN journal record contains an incorrect file name when moving a file
KB934161 - "Windows cannot calculate the effective permissions for User_Name" error when trying to view permissions for
domain-migrated user account
KB934428 - Hotfix that adds support for SDHC cards that have a capacity of more than 4 GB
KB935192 - 0x00000044 stop error when resuming computer from hibernation after applying KB918005 hotfix
KB935214 - Access violation occurs when a program is automatically stopped
KB935448 - Certain third-party applications may not start, and "Illegal System DLL Relocation" error message received
KB935839 - Vulnerability in the Win32 API could allow remote code execution
KB935840 - Vulnerability in Schannel could allow remote code execution
KB935843 - 0x0000007F stop error when trying to print from computers that have KB925902 security update installed
KB936357 - Microcode update to improve the reliability of systems with Intel processors
Other Updates
Adobe Flash Player 9.0.45.0 ActiveX Control
Macrovision SafeDisc Driver Fix 4.00.060
Microsoft European Union Expansion Font Update 1.2
Microsoft Qfecheck 6.1.0.0
Microsoft Update 7.0.6000.374
Microsoft Web Folders 9.60.6715.0 (KB892211)
Microsoft Windows Script 5.6.8831 (Includes KB917344 Hotfix)
MSXML 4.0 SP2 (Includes KB927978 Hotfix)
MSXML 6.0 SP1
Registry Tweaks
DSO Exploit registry fix that Spybot Search & Destroy complains about
Hotfixes added. After ryans
KB939683 -› FIX: Update for Windows Media Player 11 for Windows XP
Download -› 549 KB (August 27, 2007)
Switches: KB939683.exe /q /n /z
KB939373 -› Vulnerability in Microsoft Internet Information Services Could Allow Remote Code Execution
Download -› 621 KB (July 9, 2007)
Switches: KB939373.exe /q /n /z
KB938829 -› Vulnerability in GDI Could Allow Remote Code Execution
Download -› 605 KB (August 14, 2007)
Switches: KB938829.exe /q /n /z
KB938828 -› Error message when the Explorer.exe process crashes on a Windows XP SP2-based computer: "STOP 0xc0000005"
Download -› 830 KB (July 24, 2007)
Switches: KB938828.exe /q /n /z
KB938127 -› Vulnerability in Vector Markup Language could allow remote code execution
Download -› 781 KB (August 13, 2007)
Switches: KB938127.exe /q /n /z
KB937143 -› Cumulative security update for Internet Explorer
Download -› 8.06 MB (August 14, 2007)
Switches: KB937143.exe /q /n /z
KB936782 -› Vulnerability in Windows Media Player Could Allow Remote Code Execution
Download -› 5.53 MB (August 14, 2006)
Switches: KB936782.exe /q /n /z
KB936021 -› Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution
Download -› 890 KB (August 14, 2006)
Switches: KB936021.exe /q /n /z
KB884575 - Battery power may be drained more quickly than expected on Windows XP-based laptop
KB885836 - Vulnerability in WordPad could allow code execution
KB886677 - DBCS characters appear corrupted when browsing site using Shift-JIS encoding
KB887472 - Security update to Microsoft Windows Messenger
KB887606 - Microsoft XML Parser (MSXML) uses cached credentials incorrectly
KB888111 - Universal Audio Architecture High Definition Audio Class Driver Version 1.0a
KB889016 - Cannot obtain debug information about the resource objects of Application Verifier stop errors
KB889320 - Computer Browser service stops and Event ID 7023 is logged after Windows Firewall service disabled
KB889673 - DEP-enabled computer may unexpectedly quit after resuming from standby or hibernation
KB890830 - Malicious Software Removal Tool 1.30
KB892489 - Antivirus scan may increase the number of open handles for the svchost.exe process
KB893008 - PAL format digital video cameras are incorrectly detected as NTSC format digital video cameras
KB893756 - Vulnerability in Telephony service could allow remote code execution
KB893803 - Windows Installer 3.1 (v2)
KB894395 - IME Composition or Candidate window remains visible even after losing focus when using Japanese IME
KB895961 - Terminal Server Service update (From KB900325 Package)
KB896256 - A Windows XP SP2-based computer that has multiple processors exhibits decreased performance or unexpected behavior
KB896344 - Can't transfer files and settings from computer running 32-bit Windows XP to computer running Windows XP x64
KB896358 - Vulnerability in HTML Help could allow remote code execution
KB896423 - Vulnerability in Print Spooler service could allow remote code execution
KB896428 - Vulnerability in Telnet client could allow information disclosure
KB896626 - Windows XP TV tuner program stops responding or displays corrupted video
KB897338 - New language locales for Windows XP Service Pack 2
KB897663 - Exception may not show up in the Windows Firewall GUI the exception is created by modifying the registry
KB898461 - Permanent copy of the Package Installer for Windows version 6.2.29.0
KB898543 - Cannot correctly install security fixes in Windows XP Starter Edition
KB899271 - Updated USB Video Class (UVC) driver for Windows XP
KB899409 - 20-second delay when trying to access a redirected folder by logging on to computer
KB899591 - Vulnerability in Remote Desktop Protocol could allow denial of service
KB900485 - 0x0000007E stop error in Windows XP SP2
KB901017 - Vulnerability in the Microsoft Collaboration Data Objects could allow code execution
KB901190 - Vulnerability in the Korean Input Method Editor (IME) could allow elevation of privilege
KB901214 - Vulnerability in Microsoft Color Management Module could allow remote code execution
KB902149 - FTP client may echo account information back to the screen
KB902845 - Computer stops responding during text-mode Setup when you try to install Windows XP
KB902853 - An unnecessary restore operation may be started on a RAID group when computer is put in hibernation
KB903234 - Update to optimize the way that the Volume Shadow Copy Service client accesses shadow copies
KB903250 - Song titles are copied to a recordable CD after cancelling a burn operation in Windows Media Player 10
KB904412 - SBP-2 device does not work when it is connected to a Windows XP SP2-based computer
KB905414 - Vulnerability in Network Connection Manager could allow denial of service
KB905749 - Vulnerability in Plug and Play could allow remote code execution and local elevation of privilege
KB906216 - The Dhtmled.ocx ActiveX control doesn't work as expected after a program changes the Visible property of it
KB906569 - Update to add the Tools tab to the System Configuration utility in Windows XP Service Pack 2
KB906866 - 0x00000035 NO_MORE_IRP_STACK_LOCATIONS stop error when trying to log on to a domain
KB907865 - IPSec Policy Agent update
KB908519 - Vulnerability in embedded Web fonts could allow remote code execution
KB908531 - Vulnerability in Windows Explorer Could Lead to Remote Code Execution
KB908536 - Horizontal scroll bar used in forms may not respond to mouse controls or actions when using themes
KB909441 - In Control Panel, "Sounds and Audio Devices" does not correctly display the setting in "Speaker Setup" list
KB909520 - Software update for Base Smart Card Cryptographic Service Provider
KB909608 - Access violation when using /integrate switch to integrate KB900725 into Windows XP SP2 installation source files
KB909667 - Computer stops responding during standby or hibernation operations or trying to use the Shut Down command
KB910437 - Access violation error occurs when Windows Automatic Updates tries to download updates
KB911280 - Vulnerability in Routing and Remote Access could allow remote code execution
KB911562 - Vulnerability in Microsoft Data Access Components (MDAC) function could allow code execution
KB911564 - Vulnerability in Windows Media Player plug-in with non-Microsoft Internet browsers could allow remote code
execution
KB911927 - Vulnerability in WebClient could allow remote code execution
KB911990 - Connection to the Sony Media Changer/Recorder is lost
KB912024 - Update Rollup 2 for eHome Infrared Receiver
KB912461 - Cannot obtain information about specific events when you program against the DVD Nav control in Windows XP
KB913296 - Jet 4.0 data engine update fixes issues that may occur
KB913580 - Vulnerability in Microsoft Distributed Transaction Coordinator could allow denial of service
KB913808 - The embedded resource version of the LIP MUI files is incorrect in Windows XP
KB914388 - Vulnerability in the DHCP Client Service could allow remote code execution
KB914440 - Network Diagnostics for Windows XP
KB914463 - WMI causes object access failure events when an SACL is applied to the HKEY_USERS registry subkey
KB914841 - Simplify the creation and maintenance of Internet Protocol security filters
KB914906 - "Unsupported State(2)" error message when a Windows XP Starter Edition-based computer continuously restarts
KB915378 - Update for Add New Hardware Control Panel
KB915865 - XmlLite update package for Windows XP Service Pack 2
KB916595 - 0x000000D1 DRIVER_IRQL_NOT_LESS_OR_EQUAL stop error on a Windows XP SP2 computer
KB917140 - Microsoft Application Compatibility Toolkit detailed log entries cannot be logged
KB917275 - Windows Rights Management Services for Windows XP SP2
KB917730 - You cannot create a network connection when you are starting a Windows XP SP2-based computer
KB918005 - Battery power may drain more quickly than you expect on a Windows XP SP2-based portable computer
KB918033 - Certain Windows dialog boxes may not retain the focus as expected
KB918118 - Vulnerability in Microsoft RichEdit could allow remote code execution
KB918334 - Error message when running a Win32 program that makes CreateFile function calls from a client computer to a server
KB918439 - Vulnerability in ART image rendering could allow remote code execution
KB918997 - Developers can't create wireless client programs that manage wireless profiles and connections over the Wireless
Zero Configuration service
KB919007 - Vulnerability in Pragmatic General Multicast (PGM) could result in remote code execution
KB920213 - Vulnerability in Microsoft Agent could allow remote code execution
KB920342 - Upgrade PNRP to PNRP version 2.0
KB920670 - Vulnerabilities in Microsoft Windows Hyperlink Object Library could allow remote code execution
KB920683 - Vulnerability in DNS resolution could allow remote code execution
KB920685 - Vulnerability in Indexing Service could allow cross-site scripting
KB920872 - Audio playback does not play file from correct position after pausing, and Stop error message randomly received
when trying to play audio files
KB921401 - A non-paged pool memory leak occurs when you capture specific MIDI SYSEx messages in Windows XP
KB921411 - USB devices no longer work correctly after installing the Intel Chipset Software Installation Utility
KB922120 - Network Map in Windows Vista does not display computers that are running Windows XP
KB922582 - 0x80070002 error message when trying to update a Microsoft Windows-based computer
KB922668 - Windows XP COM+ Hotfix Rollup Package 14
KB922819 - Vulnerabilities in TCP/IP IPv6 could allow denial of service
KB923154 - EAP reauthentication may not occur and the Wireless Zero Configuration service may not work correctly when using a
third-party application
KB923191 - Vulnerability in Windows Explorer could allow remote code execution
KB923232 - Computer using Intel dual-core processor stops responding when trying to resume from standby
KB923414 - Vulnerability in Server Service could allow denial of service
KB923980 - Vulnerability in Client Service could allow remote code execution
KB924191 - Vulnerabilities in Microsoft XML Core Services could allow remote code execution
KB924270 - Vulnerability in Workstation Service could allow remote code execution
KB924667 - Vulnerability in Microsoft Foundation Classes could allow for remote code execution
KB924941 - Update to resolve timing issues resulting in race conditions when using Bluetooth devices connected via USB
KB925398 - Vulnerability in Windows Media Player 6.4 could allow remote code execution
KB925623 - The Wmiprvse.exe process may experience a memory leak when WMI services and RPC services are extensively used
KB925720 - Windows CardSpace hotfix rollup package
KB925876 - Remote Desktop Connection 6.0 Client
KB925902 - Vulnerability in GDI could allow remote code execution
KB925922 - Computer restarts unexpectedly or 0x000000D1 stop error message received
KB926239 - Windows Media Player 10 may close unexpectedly
KB926255 - Vulnerability in Windows could allow elevation of privilege
KB926436 - Vulnerability in Microsoft OLE Dialog could allow remote code execution
KB926646 - Can't increase the limit concurrent SMB command in the Windows XP Professional Server service
KB927544 - Can't create an AVI larger than 512GB and can't play an AVI larger than 800 GB using DirectX
KB927779 - Vulnerability in Microsoft Data Access Components could allow remote code execution
KB927802 - Vulnerability in Windows Image Acquisition Service could allow elevation of privilege
KB927880 - Can't log on to a device that has both a blank user name and password using Internet Explorer 7
KB927891 - Access violation received when trying to install an update from Windows Update
KB928255 - Vulnerability in Windows Shell could allow elevation of privilege
KB929123 - Cumulative security update for Outlook Express (June, 2006)
KB929280 - Microsoft Management Console 3.0 does not correctly display 32-bit color snap-in icons
KB929969 - Vulnerability in Vector Markup Language could allow remote code execution
KB930178 - Vulnerability in Windows CSRSS could allow remote code execution
KB931125 - Microsoft Root Certificate Update (February 2007)
KB931192 - Users in a trusted external Kerberos realm cannot access resources from a Windows Server 2003-based forest
KB931261 - Vulnerability in UPnP could allow remote code execution
KB931784 - Vulnerability in the Windows kernel could allow elevation of privilege
KB931836 - February 2007 cumulative time zone update
KB932168 - Vulnerability in Microsoft Agent could allow remote code execution
KB932590 - Windows-based applications that use the TZ environment variable may not work as expected because of changes to DST
KB932597 - "Windows cannot find the network path" error message when trying to connect to a network resource
KB932662 - An access violation occurs in a program that uses the DirectShow DV Mux filter
KB933566 - Cumulative Security Update for Internet Explorer (June, 2007)
KB933876 - USN journal record contains an incorrect file name when moving a file
KB934161 - "Windows cannot calculate the effective permissions for User_Name" error when trying to view permissions for
domain-migrated user account
KB934428 - Hotfix that adds support for SDHC cards that have a capacity of more than 4 GB
KB935192 - 0x00000044 stop error when resuming computer from hibernation after applying KB918005 hotfix
KB935214 - Access violation occurs when a program is automatically stopped
KB935448 - Certain third-party applications may not start, and "Illegal System DLL Relocation" error message received
KB935839 - Vulnerability in the Win32 API could allow remote code execution
KB935840 - Vulnerability in Schannel could allow remote code execution
KB935843 - 0x0000007F stop error when trying to print from computers that have KB925902 security update installed
KB936357 - Microcode update to improve the reliability of systems with Intel processors
Other Updates
Adobe Flash Player 9.0.45.0 ActiveX Control
Macrovision SafeDisc Driver Fix 4.00.060
Microsoft European Union Expansion Font Update 1.2
Microsoft Qfecheck 6.1.0.0
Microsoft Update 7.0.6000.374
Microsoft Web Folders 9.60.6715.0 (KB892211)
Microsoft Windows Script 5.6.8831 (Includes KB917344 Hotfix)
MSXML 4.0 SP2 (Includes KB927978 Hotfix)
MSXML 6.0 SP1
Registry Tweaks
DSO Exploit registry fix that Spybot Search & Destroy complains about
Hotfixes added. After ryans
KB939683 -› FIX: Update for Windows Media Player 11 for Windows XP
Download -› 549 KB (August 27, 2007)
Switches: KB939683.exe /q /n /z
KB939373 -› Vulnerability in Microsoft Internet Information Services Could Allow Remote Code Execution
Download -› 621 KB (July 9, 2007)
Switches: KB939373.exe /q /n /z
KB938829 -› Vulnerability in GDI Could Allow Remote Code Execution
Download -› 605 KB (August 14, 2007)
Switches: KB938829.exe /q /n /z
KB938828 -› Error message when the Explorer.exe process crashes on a Windows XP SP2-based computer: "STOP 0xc0000005"
Download -› 830 KB (July 24, 2007)
Switches: KB938828.exe /q /n /z
KB938127 -› Vulnerability in Vector Markup Language could allow remote code execution
Download -› 781 KB (August 13, 2007)
Switches: KB938127.exe /q /n /z
KB937143 -› Cumulative security update for Internet Explorer
Download -› 8.06 MB (August 14, 2007)
Switches: KB937143.exe /q /n /z
KB936782 -› Vulnerability in Windows Media Player Could Allow Remote Code Execution
Download -› 5.53 MB (August 14, 2006)
Switches: KB936782.exe /q /n /z
KB936021 -› Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution
Download -› 890 KB (August 14, 2006)
Switches: KB936021.exe /q /n /z
Administering Windows Systems/Networks
Here's the start of my "Best Practices" list for the
sucessful administration of Windows NT and 2000 based
networks. At some point, I may categorize them.
NT4
• No network is too small for a BDC
• Update your ERDs on a regular basis
WINDOWS 2000/XP/2003
• Always install the Recovery Console
• Backup the System State on a regular basis
• Use a normal account for day-to day work, and use
RUNAS for administrative work.
• The cost of a 2nd domain controller is far less than
the cost of downtime
SECURITY
• Use Strong Passwords
• Enable Auditing
• Change Passwords Regularly
• Firewalls and AntiVirus are well advised for any network
• Always create a password for the Administrator Account
INSTALLATIONS
• Create Slipstreamed CDs
• Use tracking sofware whenever installing software
on your desktop or server
• Test Patches, Fixes, and new software/drivers in
a test environment before going live.
GENERAL
• Defrag your drives
• EIDE for standard desktops; SCSI for Servers and
High-End Workstations
• ATA RAID before Software RAID
• NT/2000/XP makes a much better client OS than Win9x
• NTFS at all times
• Script your changes, so you'll have a record, and
you'll be able to duplicate them easily.
• Switches, YES; Hubs, NO
• Develop a good Backup strategy and test your backups
• Develop a good Naming Convention
• Develop a good Disaster Recovery stratey
• The command line is your friend
• Use strong passwords and a robust password policy
• Use good, reliable, robust hardware
• Use proper power supplies and clean power
• Document your changes
• Redundancy is a good thing!
• Group Policy is a powerful tool
• Document all concerns - CYA at all times
TOOLS (Originally Compiled By Jay Woody)
The following list represents tools and utilites that
can be of great use to a Windows Admin. This should
be helpful checklist for what to get at a new job:
• TOOLS/UTILS
Anti-Virus
Anti-SPAM
Defragger
Documentation Tools
NTFS Boot Utility
Password Cracker
Remote Control
Resource Kit and Support Tools
Scripting Tools
Text Editor
Zip Utility
• SYSTEM MANAGEMENT
Active Directory Management
Cloning/Imaging Software
Deployment Software
Disaster Recovery System
Event Log Monitor
High Availability Software
Inventory Software
Network Analyzer
Network Management & Diagramming
Performance Management
Policy Management
Printer Management
Service Password Management
Storage Management
SysLog Server
User/Domain Management
WebLog Analyzers
• PROTECTION/SECURITY
Encryption Tools
Firewall
Intrusion Detection Systems
Vulnerability Scanners
• MAGAZINES
Windows 2000 Magazine
ComputerWorld
InfoWorld
ENT Magazine
eWeek
Network World
• BOOKS
Inside Windows NT
Inside Windows 2000
Inside Windows 2003 (coming soon)
Mastering Windows 2000
Mastering Windows Server 2003
*any other books by Mark Minasi*
Windows 2000 Sys Admin
Tim Hill's Scripting Books (both WSH & NT Shell Scripting)
*any other books on scritping in Perl or WSH*
Building Linux/OpenBSD Firewalls
CISCO TCP/IP
Internet Security
Computer Networking Essentials
Hack Proofing Your Network: Internet Tradecraft
Securing Windows NT/2000 Servers for the Internet: A Checklist for System Administrators
Hacking Exposed: Network Security Secrets and Solutions
sucessful administration of Windows NT and 2000 based
networks. At some point, I may categorize them.
NT4
• No network is too small for a BDC
• Update your ERDs on a regular basis
WINDOWS 2000/XP/2003
• Always install the Recovery Console
• Backup the System State on a regular basis
• Use a normal account for day-to day work, and use
RUNAS for administrative work.
• The cost of a 2nd domain controller is far less than
the cost of downtime
SECURITY
• Use Strong Passwords
• Enable Auditing
• Change Passwords Regularly
• Firewalls and AntiVirus are well advised for any network
• Always create a password for the Administrator Account
INSTALLATIONS
• Create Slipstreamed CDs
• Use tracking sofware whenever installing software
on your desktop or server
• Test Patches, Fixes, and new software/drivers in
a test environment before going live.
GENERAL
• Defrag your drives
• EIDE for standard desktops; SCSI for Servers and
High-End Workstations
• ATA RAID before Software RAID
• NT/2000/XP makes a much better client OS than Win9x
• NTFS at all times
• Script your changes, so you'll have a record, and
you'll be able to duplicate them easily.
• Switches, YES; Hubs, NO
• Develop a good Backup strategy and test your backups
• Develop a good Naming Convention
• Develop a good Disaster Recovery stratey
• The command line is your friend
• Use strong passwords and a robust password policy
• Use good, reliable, robust hardware
• Use proper power supplies and clean power
• Document your changes
• Redundancy is a good thing!
• Group Policy is a powerful tool
• Document all concerns - CYA at all times
TOOLS (Originally Compiled By Jay Woody)
The following list represents tools and utilites that
can be of great use to a Windows Admin. This should
be helpful checklist for what to get at a new job:
• TOOLS/UTILS
Anti-Virus
Anti-SPAM
Defragger
Documentation Tools
NTFS Boot Utility
Password Cracker
Remote Control
Resource Kit and Support Tools
Scripting Tools
Text Editor
Zip Utility
• SYSTEM MANAGEMENT
Active Directory Management
Cloning/Imaging Software
Deployment Software
Disaster Recovery System
Event Log Monitor
High Availability Software
Inventory Software
Network Analyzer
Network Management & Diagramming
Performance Management
Policy Management
Printer Management
Service Password Management
Storage Management
SysLog Server
User/Domain Management
WebLog Analyzers
• PROTECTION/SECURITY
Encryption Tools
Firewall
Intrusion Detection Systems
Vulnerability Scanners
• MAGAZINES
Windows 2000 Magazine
ComputerWorld
InfoWorld
ENT Magazine
eWeek
Network World
• BOOKS
Inside Windows NT
Inside Windows 2000
Inside Windows 2003 (coming soon)
Mastering Windows 2000
Mastering Windows Server 2003
*any other books by Mark Minasi*
Windows 2000 Sys Admin
Tim Hill's Scripting Books (both WSH & NT Shell Scripting)
*any other books on scritping in Perl or WSH*
Building Linux/OpenBSD Firewalls
CISCO TCP/IP
Internet Security
Computer Networking Essentials
Hack Proofing Your Network: Internet Tradecraft
Securing Windows NT/2000 Servers for the Internet: A Checklist for System Administrators
Hacking Exposed: Network Security Secrets and Solutions
Telnet For Beginners
First of all what is telnet? Telnet is a protocol which is part of the TCP/IP suite. It is quite similar to the UNIX rlogin program. Telnet allows you to control a remote computer from your own one. It is terminal emulation software. In the old days harddrives were humonguous and expensive (i am talking waY back here) and there were no personal computers. To make use of existing computers you had to lease hardrive space and use terminals to operate the system. For developers this was great because computing became lots cheaper. You needed a server and many connections could be made. With telnet u can emulate this type of distributed computing and for example operate a supercomputer from a distance.
TCP/IP works with ports and telnet has one also. It's nr 23. It's has several rfc's. Nr 854 dates back to 1983 and is named telnet protocol specification.
With telnet you can do various things like send mail, log in to irc or proxy and even (though hardly anymore) view and modify websites. There are telnet services available allowing you to search through large databases using telnet. With this you use the remote computer's power so it won't presure your precious resources. Usually help or remotehelp are the commands to use to find out what you can and cannot do. If you can't see what you type in then set echo. Once you made a connection you can use the computer as if it was your own. You use command lines for this.
Telnet knows different emulation types. VT-100 is most used. This emulation was used on the video terminals of DEC. There are still VT-100 servers running out there. Scientists use these.
To use telnet you need a client. Windows has telnet built in by default (as does UNIX but that's a different story), but there are third party clients available on the net. You start a telnet session by typing in the command 'telnet server.net 23' where the port number is optional. Since Telnet was based on UNIX (as it is part of TCP/IP which also was based on UNIX) it uses UNIX commands. Basic knowledge would help you here. The port number specifies what services you will use. 23 is the default one. You can log into various services. 80 is the HTTP server for that.
So say you wanted to modify your site from a distance on a leased line. You don't have your fav progs and hardly any time.
/* telnet server.net 80 (leave the /*)
/* GET http://www.server.net/YOURSITE.HTM HTTP/1.1
You can use this method to get the output of a cgi-script as well. The simple request doesn't use the HTTP/1.1 (this is the HTTP version running on the server). If you perform a bad request you usually get some info on the server. Use this to find a the correct versions of services running.
To put files to the server u use the PUT command. Telnet is pretty simillar to FTP which is also part of TCP/IP. There are other commands available like POST, which is used to put larger data files to the server, HEAD to get the sites header and DELETE. This one is obvious isn't it.
You can also use telnet to send raw imails. The port to login to is 25.
First you have to identify your self. This geos like this:
/* telnet mail.server.net 25
/* HELO www.you.net
When you typed this command you'll get some feedback telling you who and what you logged on to. When you login u may get also some feedback telling you things. :`;
After this you tell the server where the mail is from like this:
/* MAIL FROM:you@youradress.net
The server will give you feedback again telling you
/* ...Sender OK
You are accepted. Now for the receipant
/* RCPT TO:yourroommate@hisadress.net
again feedback
/* ...Receptient OK
The server stil does it's duty.....
/* DATA
After typing this command you'll get the instructions on the proper way to send the mail. Type your mail using the instructions. After you're done sending your mail close the connection using
/* QUIT (or END, EXIT, LOGOFF LOGOUT)
You can use this to receive your mail as well (if your provider allows you). The POP port is 110. Telnet to the server on this port. Once there use the following commands.
/* USER you@THE_SERVER_GOES_HERE.net
/* PASS ;type in your password (simple huh.).
Once you are accepted as a valid user use the following to list your mail.
/* LIST
Ports can be configured so they may be different on some systems. Many admins use the default ones though.
Two things come in handy when completly understanding telnet and how it works. They are a basic understanding of TCP/IP and a basic understanding of UNIX commands.
You could use telnet to connect to a proxy and from there on continue your quest. Find a good proxy (use a search engine to locate one) and create an account. Now telnet to the server on the port specified on the website and hang loose. Using a proxy to use the web keeps your identity better hidden. Proxies often use port 8080 or 3128. If you use IE or Netscape you configure them to use a proxy. If you have computer friends maybe they could help you locate one nearby. To learn more about proxies read a tutorial about them. Telnet is part of TCP/IP and with this comes specific built in connection security. This basicly comes down to the three-way-handshake which i will not furtherly discuss in this tut. Terminal emulation was embraced by developers because it is a quick and secure way for remote computing.
Bcause telnet is developed to be quick and reliable you could use it to connect yourself to an irc-server and chat with your buddies without a resource consuming GUI. You may even want to use a proxy to keep the (f)lamers from finding out your ip. To do this you have to know that the irc protocol has it's ports dedicated to 6666:6669. Ports can be configured so you have to know to what port you should connect. The identd runs on port 113. Better use a shell account to connect to IRC servers or a GUI client. Once you are there u can use the usual irc commands. If you have got a good shell (command.com) you can use scripts to automate procedures. To learn more about irc: Request for Comments: 1459 Internet Relay Chat Protocol. mIrc is a pretty good irc-client for nowadays high resource conputers if you want to learn this to. Since linux was built on UNIX and linux is free, you should have by now installed this operating system. OK
U can also post to newsgroups if the server allows this. Newsgroups use nntp (rfc 977) over port 119. Use your skills. If you want to get information on a particular system you can use a technique known as port scanning. There are pretty fancy port scanners on the net but to become a guru you will have to know how hits take place. So use port surfing instead. Telnet to the server on various ports to get info on services. This is much more rewarding then using someone else's portscanner. If you want to become a good hacker learn a programming language and write your own. Because TCP/IP is not designed for a specific platform it works much the same on any. TCP/IP uses ports that have certain services.
There are severel interresting ports for trying telnet like 7:echo. This one replies whatever you type in.
13 daytime
15 netstat
37 time time
39 rlp
53 domain
119 nntp
443 https
Use your commands to get the requested info. By connecting to different services you get a clear look at the system in use. If you want to exploit a system use the info and go to exploiters.net. If you come across a system you don't know read the ALT.2600.FAQ.
There are also a lot of trojans circulating (like back orifice or netbus). If you know how to use these you can do some rad things but mostly the use if trojans is considered lame. Learn the commands and setup your private backdoor. When you want to attack a system prepare yourself for this. There has been some discussion on the legality of port-scanning/surfing. Many servers log every attempt to connect to it. Be warned.
The expansion of free software towards the windows market gives great tools to set up your own hackerlab. For this you use your computer and one other. Set up a simple network with a server.
Configure the server and start hacking.
If you have a root account on a telnet server you can use this to remotely administer the server. There are many wats to get a root account. Remember that if an administrator finds a new root account on his system he will know it has been tampered with. Covering your tracks is fatal if you want to stay uncaught. Telnetting from a PDA is a pretty fancy way to read your mail or post to newsgroups from a distance. Because GSM phones can only transmit upto 9600 bps you might not want to load up the web.
TCP/IP works with ports and telnet has one also. It's nr 23. It's has several rfc's. Nr 854 dates back to 1983 and is named telnet protocol specification.
With telnet you can do various things like send mail, log in to irc or proxy and even (though hardly anymore) view and modify websites. There are telnet services available allowing you to search through large databases using telnet. With this you use the remote computer's power so it won't presure your precious resources. Usually help or remotehelp are the commands to use to find out what you can and cannot do. If you can't see what you type in then set echo. Once you made a connection you can use the computer as if it was your own. You use command lines for this.
Telnet knows different emulation types. VT-100 is most used. This emulation was used on the video terminals of DEC. There are still VT-100 servers running out there. Scientists use these.
To use telnet you need a client. Windows has telnet built in by default (as does UNIX but that's a different story), but there are third party clients available on the net. You start a telnet session by typing in the command 'telnet server.net 23' where the port number is optional. Since Telnet was based on UNIX (as it is part of TCP/IP which also was based on UNIX) it uses UNIX commands. Basic knowledge would help you here. The port number specifies what services you will use. 23 is the default one. You can log into various services. 80 is the HTTP server for that.
So say you wanted to modify your site from a distance on a leased line. You don't have your fav progs and hardly any time.
/* telnet server.net 80 (leave the /*)
/* GET http://www.server.net/YOURSITE.HTM HTTP/1.1
You can use this method to get the output of a cgi-script as well. The simple request doesn't use the HTTP/1.1 (this is the HTTP version running on the server). If you perform a bad request you usually get some info on the server. Use this to find a the correct versions of services running.
To put files to the server u use the PUT command. Telnet is pretty simillar to FTP which is also part of TCP/IP. There are other commands available like POST, which is used to put larger data files to the server, HEAD to get the sites header and DELETE. This one is obvious isn't it.
You can also use telnet to send raw imails. The port to login to is 25.
First you have to identify your self. This geos like this:
/* telnet mail.server.net 25
/* HELO www.you.net
When you typed this command you'll get some feedback telling you who and what you logged on to. When you login u may get also some feedback telling you things. :`;
After this you tell the server where the mail is from like this:
/* MAIL FROM:you@youradress.net
The server will give you feedback again telling you
/* ...Sender OK
You are accepted. Now for the receipant
/* RCPT TO:yourroommate@hisadress.net
again feedback
/* ...Receptient OK
The server stil does it's duty.....
/* DATA
After typing this command you'll get the instructions on the proper way to send the mail. Type your mail using the instructions. After you're done sending your mail close the connection using
/* QUIT (or END, EXIT, LOGOFF LOGOUT)
You can use this to receive your mail as well (if your provider allows you). The POP port is 110. Telnet to the server on this port. Once there use the following commands.
/* USER you@THE_SERVER_GOES_HERE.net
/* PASS ;type in your password (simple huh.).
Once you are accepted as a valid user use the following to list your mail.
/* LIST
Ports can be configured so they may be different on some systems. Many admins use the default ones though.
Two things come in handy when completly understanding telnet and how it works. They are a basic understanding of TCP/IP and a basic understanding of UNIX commands.
You could use telnet to connect to a proxy and from there on continue your quest. Find a good proxy (use a search engine to locate one) and create an account. Now telnet to the server on the port specified on the website and hang loose. Using a proxy to use the web keeps your identity better hidden. Proxies often use port 8080 or 3128. If you use IE or Netscape you configure them to use a proxy. If you have computer friends maybe they could help you locate one nearby. To learn more about proxies read a tutorial about them. Telnet is part of TCP/IP and with this comes specific built in connection security. This basicly comes down to the three-way-handshake which i will not furtherly discuss in this tut. Terminal emulation was embraced by developers because it is a quick and secure way for remote computing.
Bcause telnet is developed to be quick and reliable you could use it to connect yourself to an irc-server and chat with your buddies without a resource consuming GUI. You may even want to use a proxy to keep the (f)lamers from finding out your ip. To do this you have to know that the irc protocol has it's ports dedicated to 6666:6669. Ports can be configured so you have to know to what port you should connect. The identd runs on port 113. Better use a shell account to connect to IRC servers or a GUI client. Once you are there u can use the usual irc commands. If you have got a good shell (command.com) you can use scripts to automate procedures. To learn more about irc: Request for Comments: 1459 Internet Relay Chat Protocol. mIrc is a pretty good irc-client for nowadays high resource conputers if you want to learn this to. Since linux was built on UNIX and linux is free, you should have by now installed this operating system. OK
U can also post to newsgroups if the server allows this. Newsgroups use nntp (rfc 977) over port 119. Use your skills. If you want to get information on a particular system you can use a technique known as port scanning. There are pretty fancy port scanners on the net but to become a guru you will have to know how hits take place. So use port surfing instead. Telnet to the server on various ports to get info on services. This is much more rewarding then using someone else's portscanner. If you want to become a good hacker learn a programming language and write your own. Because TCP/IP is not designed for a specific platform it works much the same on any. TCP/IP uses ports that have certain services.
There are severel interresting ports for trying telnet like 7:echo. This one replies whatever you type in.
13 daytime
15 netstat
37 time time
39 rlp
53 domain
119 nntp
443 https
Use your commands to get the requested info. By connecting to different services you get a clear look at the system in use. If you want to exploit a system use the info and go to exploiters.net. If you come across a system you don't know read the ALT.2600.FAQ.
There are also a lot of trojans circulating (like back orifice or netbus). If you know how to use these you can do some rad things but mostly the use if trojans is considered lame. Learn the commands and setup your private backdoor. When you want to attack a system prepare yourself for this. There has been some discussion on the legality of port-scanning/surfing. Many servers log every attempt to connect to it. Be warned.
The expansion of free software towards the windows market gives great tools to set up your own hackerlab. For this you use your computer and one other. Set up a simple network with a server.
Configure the server and start hacking.
If you have a root account on a telnet server you can use this to remotely administer the server. There are many wats to get a root account. Remember that if an administrator finds a new root account on his system he will know it has been tampered with. Covering your tracks is fatal if you want to stay uncaught. Telnetting from a PDA is a pretty fancy way to read your mail or post to newsgroups from a distance. Because GSM phones can only transmit upto 9600 bps you might not want to load up the web.
BLOCK AND UNBLOCK WEBSITES
Many times in schools, colleges & offices surfing some sites like orkut,etc are banned !
To overcome this you can unblock these or block some other websites and play pranks !
Do The Following :
For eg you want to block www.xyz.com !
* Open the folder C:\WINDOWS\system32\drivers\etc
* There you will find a file named HOSTS
* Click on the file and press SHIFT and now right click on it .
* From the right click menu select Open with .
* Now, select Notepad to open the file from the list !
* Now, in the file under the line 127.0.0.1 localhost add another line as 127.0.0.2 www.xyz.com.
* Now, File>>Save !
Now, open your web browser and try openning www.xyz.com , it will not load !
To unblock sites just do the opposite !
To overcome this you can unblock these or block some other websites and play pranks !
Do The Following :
For eg you want to block www.xyz.com !
* Open the folder C:\WINDOWS\system32\drivers\etc
* There you will find a file named HOSTS
* Click on the file and press SHIFT and now right click on it .
* From the right click menu select Open with .
* Now, select Notepad to open the file from the list !
* Now, in the file under the line 127.0.0.1 localhost add another line as 127.0.0.2 www.xyz.com.
* Now, File>>Save !
Now, open your web browser and try openning www.xyz.com , it will not load !
To unblock sites just do the opposite !
Ports Number And Names
List of frequently seen TCP and UDP ports and what they mean. The goal of this port table is to point to further resources for more information.
--------------------------------------------------------------------------------
0
1 tcpmux
3
4
5 rje
7 echo
9 discard
11 systat
13 daytime
15 netstat
17 qotd
18 send/rwp
19 chargen
20 ftp-data
21 ftp
22 ssh, pcAnywhere
23 Telnet
25 SMTP
27 ETRN
29 msg-icp
31 msg-auth
33 dsp
37 time
38 RAP
39 rlp
40
41
42 nameserv, WINS
43 whois, nickname
49 TACACS, Login Host Protocol
50 RMCP, re-mail-ck
53 DNS
57 MTP
59 NFILE
63 whois++
66 sql*net
67 bootps
68 bootpd/dhcp
69 Trivial File Transfer Protocol (tftp)
70 Gopher
79 finger
80 www-http
87
88 Kerberos, WWW
95 supdup
96 DIXIE
98 linuxconf
101 HOSTNAME
102 ISO, X.400, ITOT
105 cso
106 poppassd
109 POP2
110 POP3
111 Sun RPC Portmapper
113 identd/auth
115 sftp
116
117 uucp
118
119 NNTP
120 CFDP
123 NTP
124 SecureID
129 PWDGEN
133 statsrv
135 loc-srv/epmap
137 netbios-ns
138 netbios-dgm (UDP)
139 NetBIOS
143 IMAP
144 NewS
150
152 BFTP
153 SGMP
156
161 SNMP
175 vmnet
177 XDMCP
178 NextStep Window Server
179 BGP
180 SLmail admin
199 smux
210 Z39.50
213
218 MPP
220 IMAP3
256
257
258
259 ESRO
264 FW1_topo
311 Apple WebAdmin
350 MATIP type A
351 MATIP type B
360
363 RSVP tunnel
366 ODMR (On-Demand Mail Relay)
371
387 AURP (AppleTalk Update-Based Routing Protocol)
389 LDAP
407 Timbuktu
427
434 Mobile IP
443 ssl
444 snpp, Simple Network Paging Protocol
445 SMB
458 QuickTime TV/Conferencing
468 Photuris
475
500 ISAKMP, pluto
511
512 biff, rexec
513 who, rlogin
514 syslog, rsh
515 lp, lpr, line printer
517 talk
520 RIP (Routing Information Protocol)
521 RIPng
522 ULS
531 IRC
543 KLogin, AppleShare over IP
545 QuickTime
548 AFP
554 Real Time Streaming Protocol
555 phAse Zero
563 NNTP over SSL
575 VEMMI
581 Bundle Discovery Protocol
593 MS-RPC
608 SIFT/UFT
626 Apple ASIA
631 IPP (Internet Printing Protocol)
635 mountd
636 sldap
642 EMSD
648 RRP (NSI Registry Registrar Protocol)
655 tinc
660 Apple MacOS Server Admin
666 Doom
674 ACAP
687 AppleShare IP Registry
700 buddyphone
705 AgentX for SNMP
901 swat, realsecure
993 s-imap
995 s-pop
999
1024
1025
1050
1062 Veracity
1080 SOCKS
1085 WebObjects
1100
1105
1114
1227 DNS2Go
1234
1243 SubSeven
1338 Millennium Worm
1352 Lotus Notes
1381 Apple Network License Manager
1417 Timbuktu
1418 Timbuktu
1419 Timbuktu
1420
1433 Microsoft SQL Server
1434 Microsoft SQL Monitor
1477
1478
1490
1494 Citrix ICA Protocol
1498
1500
1503 T.120
1521 Oracle SQL
1522
1524
1525 prospero
1526 prospero
1527 tlisrv
1529
1547
1604 Citrix ICA, MS Terminal Server
1645 RADIUS Authentication
1646 RADIUS Accounting
1680 Carbon Copy
1701 L2TP/LSF
1717 Convoy
1720 H.323/Q.931
1723 PPTP control port
1731
1755 Windows Media .asf
1758 TFTP multicast
1761
1762
1808
1812 RADIUS server
1813 RADIUS accounting
1818 ETFTP
1968
1973 DLSw DCAP/DRAP
1975
1978
1979
1985 HSRP
1999 Cisco AUTH
2000
2001 glimpse
2005
2010
2023
2048
2049 NFS
2064 distributed.net
2065 DLSw
2066 DLSw
2080
2106 MZAP
2140 DeepThroat
2301 Compaq Insight Management Web Agents
2327 Netscape Conference
2336 Apple UG Control
2345
2427 MGCP gateway
2504 WLBS
2535 MADCAP
2543 sip
2565
2592 netrek
2727 MGCP call agent
2766
2628 DICT
2998 ISS Real Secure Console Service Port
3000 Firstclass
3001
3031 Apple AgentVU
3052
3128 squid
3130 ICP
3150 DeepThroat
3264 ccmail
3283 Apple NetAssitant
3288 COPS
3305 ODETTE
3306 mySQL
3352
3389 RDP Protocol (Terminal Server)
3520
3521 netrek
3879
4000 icq, command-n-conquer
4045
4144
4242
4321 rwhois
4333 mSQL
4444
47017
4827 HTCP
5000
5001
5002
5004 RTP
5005 RTP
5010 Yahoo! Messenger
5050
5060 SIP
5135
5150
5190 AIM
5222
5353
5400
5500 securid
5501 securidprop
5300
5423 Apple VirtualUser
5555
5556
5631 PCAnywhere data
5632 PCAnywhere
5678
5800 VNC
5801 VNC
5900 VNC
5901 VNC
5843
6000 X Windows
6112 BattleNet
6050
6499
6500
6502 Netscape Conference
6547
6548
6549
6666
6667 IRC
6670 VocalTec Internet Phone, DeepThroat
6699 napster
6776 Sub7
6968
6969
6970 RTP
6971
7000
7007 MSBD, Windows Media encoder
7070 RealServer/QuickTime
7161
7323
7777
7778 Unreal
7640
7648 CU-SeeMe
7649 CU-SeeMe
7654
8000
8002
8010 WinGate 2.1
8080 HTTP
8100
8181 HTTP
8383 IMail WWW
8765
8875 napster
8888 napster
8890
9000
9090
9200
9704
9669
9876
9989
10008 cheese worm
10752
12345
11371 PGP 5 Keyserver
12346
13000
13223 PowWow
13224 PowWow
14000
14237 Palm
14238 Palm
14690
16969
18888 LiquidAudio
21157 Activision
22555
22703
22793
23213 PowWow
23214 PowWow
23456 EvilFTP
26000 Quake
27000
27001 QuakeWorld
27010 Half-Life
27015 Half-Life
27374
27444
27665
27910
27960 QuakeIII
28000
28001
28002
28003
28004
28005
28006
28007
28008
30029 AOL Admin
30100
30101
30102
30103
30303
30464
31335
31337 Back Orifice
32000
32771
32777 rpc.walld
34555
40193 Novell
41524 arcserve discovery
45000 Cisco NetRanger postofficed
50505
52901
54321
61000
65301
Multicast hidden
ICMP Type hidden
9998
32773 rpc.ttdbserverd
32776 rpc.spray
32779 rpc.cmsd
38036 timestep
http://www.iss.net/security_center/advice/...rts/default.htm
--------------------------------------------------------------------------------
0
1 tcpmux
3
4
5 rje
7 echo
9 discard
11 systat
13 daytime
15 netstat
17 qotd
18 send/rwp
19 chargen
20 ftp-data
21 ftp
22 ssh, pcAnywhere
23 Telnet
25 SMTP
27 ETRN
29 msg-icp
31 msg-auth
33 dsp
37 time
38 RAP
39 rlp
40
41
42 nameserv, WINS
43 whois, nickname
49 TACACS, Login Host Protocol
50 RMCP, re-mail-ck
53 DNS
57 MTP
59 NFILE
63 whois++
66 sql*net
67 bootps
68 bootpd/dhcp
69 Trivial File Transfer Protocol (tftp)
70 Gopher
79 finger
80 www-http
87
88 Kerberos, WWW
95 supdup
96 DIXIE
98 linuxconf
101 HOSTNAME
102 ISO, X.400, ITOT
105 cso
106 poppassd
109 POP2
110 POP3
111 Sun RPC Portmapper
113 identd/auth
115 sftp
116
117 uucp
118
119 NNTP
120 CFDP
123 NTP
124 SecureID
129 PWDGEN
133 statsrv
135 loc-srv/epmap
137 netbios-ns
138 netbios-dgm (UDP)
139 NetBIOS
143 IMAP
144 NewS
150
152 BFTP
153 SGMP
156
161 SNMP
175 vmnet
177 XDMCP
178 NextStep Window Server
179 BGP
180 SLmail admin
199 smux
210 Z39.50
213
218 MPP
220 IMAP3
256
257
258
259 ESRO
264 FW1_topo
311 Apple WebAdmin
350 MATIP type A
351 MATIP type B
360
363 RSVP tunnel
366 ODMR (On-Demand Mail Relay)
371
387 AURP (AppleTalk Update-Based Routing Protocol)
389 LDAP
407 Timbuktu
427
434 Mobile IP
443 ssl
444 snpp, Simple Network Paging Protocol
445 SMB
458 QuickTime TV/Conferencing
468 Photuris
475
500 ISAKMP, pluto
511
512 biff, rexec
513 who, rlogin
514 syslog, rsh
515 lp, lpr, line printer
517 talk
520 RIP (Routing Information Protocol)
521 RIPng
522 ULS
531 IRC
543 KLogin, AppleShare over IP
545 QuickTime
548 AFP
554 Real Time Streaming Protocol
555 phAse Zero
563 NNTP over SSL
575 VEMMI
581 Bundle Discovery Protocol
593 MS-RPC
608 SIFT/UFT
626 Apple ASIA
631 IPP (Internet Printing Protocol)
635 mountd
636 sldap
642 EMSD
648 RRP (NSI Registry Registrar Protocol)
655 tinc
660 Apple MacOS Server Admin
666 Doom
674 ACAP
687 AppleShare IP Registry
700 buddyphone
705 AgentX for SNMP
901 swat, realsecure
993 s-imap
995 s-pop
999
1024
1025
1050
1062 Veracity
1080 SOCKS
1085 WebObjects
1100
1105
1114
1227 DNS2Go
1234
1243 SubSeven
1338 Millennium Worm
1352 Lotus Notes
1381 Apple Network License Manager
1417 Timbuktu
1418 Timbuktu
1419 Timbuktu
1420
1433 Microsoft SQL Server
1434 Microsoft SQL Monitor
1477
1478
1490
1494 Citrix ICA Protocol
1498
1500
1503 T.120
1521 Oracle SQL
1522
1524
1525 prospero
1526 prospero
1527 tlisrv
1529
1547
1604 Citrix ICA, MS Terminal Server
1645 RADIUS Authentication
1646 RADIUS Accounting
1680 Carbon Copy
1701 L2TP/LSF
1717 Convoy
1720 H.323/Q.931
1723 PPTP control port
1731
1755 Windows Media .asf
1758 TFTP multicast
1761
1762
1808
1812 RADIUS server
1813 RADIUS accounting
1818 ETFTP
1968
1973 DLSw DCAP/DRAP
1975
1978
1979
1985 HSRP
1999 Cisco AUTH
2000
2001 glimpse
2005
2010
2023
2048
2049 NFS
2064 distributed.net
2065 DLSw
2066 DLSw
2080
2106 MZAP
2140 DeepThroat
2301 Compaq Insight Management Web Agents
2327 Netscape Conference
2336 Apple UG Control
2345
2427 MGCP gateway
2504 WLBS
2535 MADCAP
2543 sip
2565
2592 netrek
2727 MGCP call agent
2766
2628 DICT
2998 ISS Real Secure Console Service Port
3000 Firstclass
3001
3031 Apple AgentVU
3052
3128 squid
3130 ICP
3150 DeepThroat
3264 ccmail
3283 Apple NetAssitant
3288 COPS
3305 ODETTE
3306 mySQL
3352
3389 RDP Protocol (Terminal Server)
3520
3521 netrek
3879
4000 icq, command-n-conquer
4045
4144
4242
4321 rwhois
4333 mSQL
4444
47017
4827 HTCP
5000
5001
5002
5004 RTP
5005 RTP
5010 Yahoo! Messenger
5050
5060 SIP
5135
5150
5190 AIM
5222
5353
5400
5500 securid
5501 securidprop
5300
5423 Apple VirtualUser
5555
5556
5631 PCAnywhere data
5632 PCAnywhere
5678
5800 VNC
5801 VNC
5900 VNC
5901 VNC
5843
6000 X Windows
6112 BattleNet
6050
6499
6500
6502 Netscape Conference
6547
6548
6549
6666
6667 IRC
6670 VocalTec Internet Phone, DeepThroat
6699 napster
6776 Sub7
6968
6969
6970 RTP
6971
7000
7007 MSBD, Windows Media encoder
7070 RealServer/QuickTime
7161
7323
7777
7778 Unreal
7640
7648 CU-SeeMe
7649 CU-SeeMe
7654
8000
8002
8010 WinGate 2.1
8080 HTTP
8100
8181 HTTP
8383 IMail WWW
8765
8875 napster
8888 napster
8890
9000
9090
9200
9704
9669
9876
9989
10008 cheese worm
10752
12345
11371 PGP 5 Keyserver
12346
13000
13223 PowWow
13224 PowWow
14000
14237 Palm
14238 Palm
14690
16969
18888 LiquidAudio
21157 Activision
22555
22703
22793
23213 PowWow
23214 PowWow
23456 EvilFTP
26000 Quake
27000
27001 QuakeWorld
27010 Half-Life
27015 Half-Life
27374
27444
27665
27910
27960 QuakeIII
28000
28001
28002
28003
28004
28005
28006
28007
28008
30029 AOL Admin
30100
30101
30102
30103
30303
30464
31335
31337 Back Orifice
32000
32771
32777 rpc.walld
34555
40193 Novell
41524 arcserve discovery
45000 Cisco NetRanger postofficed
50505
52901
54321
61000
65301
Multicast hidden
ICMP Type hidden
9998
32773 rpc.ttdbserverd
32776 rpc.spray
32779 rpc.cmsd
38036 timestep
http://www.iss.net/security_center/advice/...rts/default.htm
Tuesday, September 23, 2008
Lab 10 - Server Security (2CD)
http://rapidshare.com/files/140939909/zCBT_-_10_-_Server_Security.part01.rar
http://rapidshare.com/files/140939933/zCBT_-_10_-_Server_Security.part02.rar
http://rapidshare.com/files/140939881/zCBT_-_10_-_Server_Security.part03.rar
http://rapidshare.com/files/140939913/zCBT_-_10_-_Server_Security.part04.rar
http://rapidshare.com/files/140939898/zCBT_-_10_-_Server_Security.part05.rar
http://rapidshare.com/files/140940920/zCBT_-_10_-_Server_Security.part06.rar
http://rapidshare.com/files/140939915/zCBT_-_10_-_Server_Security.part08.rar
http://rapidshare.com/files/140940925/zCBT_-_10_-_Server_Security.part09.rar
http://rapidshare.com/files/140940905/zCBT_-_10_-_Server_Security.part10.rar
http://rapidshare.com/files/140940917/zCBT_-_10_-_Server_Security.part11.rar
http://rapidshare.com/files/140939637/zCBT_-_10_-_Server_Security.part12.rar
http://rapidshare.com/files/140939933/zCBT_-_10_-_Server_Security.part02.rar
http://rapidshare.com/files/140939881/zCBT_-_10_-_Server_Security.part03.rar
http://rapidshare.com/files/140939913/zCBT_-_10_-_Server_Security.part04.rar
http://rapidshare.com/files/140939898/zCBT_-_10_-_Server_Security.part05.rar
http://rapidshare.com/files/140940920/zCBT_-_10_-_Server_Security.part06.rar
http://rapidshare.com/files/140939915/zCBT_-_10_-_Server_Security.part08.rar
http://rapidshare.com/files/140940925/zCBT_-_10_-_Server_Security.part09.rar
http://rapidshare.com/files/140940905/zCBT_-_10_-_Server_Security.part10.rar
http://rapidshare.com/files/140940917/zCBT_-_10_-_Server_Security.part11.rar
http://rapidshare.com/files/140939637/zCBT_-_10_-_Server_Security.part12.rar
Lab 09 - Routers and Packet Filters (1CD)
CODE
http://rapidshare.com/files/140939899/zCBT_-_09_-_Routers_and_Packet_Filters.part1.rar
http://rapidshare.com/files/140939883/zCBT_-_09_-_Routers_and_Packet_Filters.part2.rar
http://rapidshare.com/files/140940898/zCBT_-_09_-_Routers_and_Packet_Filters.part3.rar
http://rapidshare.com/files/140939824/zCBT_-_09_-_Routers_and_Packet_Filters.part4.rar
http://rapidshare.com/files/140939899/zCBT_-_09_-_Routers_and_Packet_Filters.part1.rar
http://rapidshare.com/files/140939883/zCBT_-_09_-_Routers_and_Packet_Filters.part2.rar
http://rapidshare.com/files/140940898/zCBT_-_09_-_Routers_and_Packet_Filters.part3.rar
http://rapidshare.com/files/140939824/zCBT_-_09_-_Routers_and_Packet_Filters.part4.rar
Lab 08 - Virtual Private Networks (1CD)
CODE
http://rapidshare.com/files/140939868/zCBT_-_08_-_Virtual_Private_Networks.part1.rar
http://rapidshare.com/files/140939872/zCBT_-_08_-_Virtual_Private_Networks.part2.rar
http://rapidshare.com/files/140939878/zCBT_-_08_-_Virtual_Private_Networks.part3.rar
http://rapidshare.com/files/140939885/zCBT_-_08_-_Virtual_Private_Networks.part4.rar
http://rapidshare.com/files/140939905/zCBT_-_08_-_Virtual_Private_Networks.part5.rar
http://rapidshare.com/files/140939088/zCBT_-_08_-_Virtual_Private_Networks.part6.rar
http://rapidshare.com/files/140939868/zCBT_-_08_-_Virtual_Private_Networks.part1.rar
http://rapidshare.com/files/140939872/zCBT_-_08_-_Virtual_Private_Networks.part2.rar
http://rapidshare.com/files/140939878/zCBT_-_08_-_Virtual_Private_Networks.part3.rar
http://rapidshare.com/files/140939885/zCBT_-_08_-_Virtual_Private_Networks.part4.rar
http://rapidshare.com/files/140939905/zCBT_-_08_-_Virtual_Private_Networks.part5.rar
http://rapidshare.com/files/140939088/zCBT_-_08_-_Virtual_Private_Networks.part6.rar
Lab 07 - Internet Gateways (1CD)
CODE
http://rapidshare.com/files/140939343/zCBT_-_07_-_Internet_Gateways.part1.rar
http://rapidshare.com/files/140939892/zCBT_-_07_-_Internet_Gateways.part2.rar
http://rapidshare.com/files/140939871/zCBT_-_07_-_Internet_Gateways.part3.rar
http://rapidshare.com/files/140939350/zCBT_-_07_-_Internet_Gateways.part4.rar
http://rapidshare.com/files/140939382/zCBT_-_07_-_Internet_Gateways.part5.rar
http://rapidshare.com/files/140938208/zCBT_-_07_-_Internet_Gateways.part6.rar
http://rapidshare.com/files/140939343/zCBT_-_07_-_Internet_Gateways.part1.rar
http://rapidshare.com/files/140939892/zCBT_-_07_-_Internet_Gateways.part2.rar
http://rapidshare.com/files/140939871/zCBT_-_07_-_Internet_Gateways.part3.rar
http://rapidshare.com/files/140939350/zCBT_-_07_-_Internet_Gateways.part4.rar
http://rapidshare.com/files/140939382/zCBT_-_07_-_Internet_Gateways.part5.rar
http://rapidshare.com/files/140938208/zCBT_-_07_-_Internet_Gateways.part6.rar
Lab 06 - WINS Infrastructure (2CD)
CODE
http://rapidshare.com/files/140939363/zCBT_-_06_-_WINS_Infrastructure.part01.rar
http://rapidshare.com/files/140939886/zCBT_-_06_-_WINS_Infrastructure.part02.rar
http://rapidshare.com/files/140940931/zCBT_-_06_-_WINS_Infrastructure.part03.rar
http://rapidshare.com/files/140939365/zCBT_-_06_-_WINS_Infrastructure.part04.rar
http://rapidshare.com/files/140939321/zCBT_-_06_-_WINS_Infrastructure.part05.rar
http://rapidshare.com/files/140939925/zCBT_-_06_-_WINS_Infrastructure.part06.rar
http://rapidshare.com/files/140939370/zCBT_-_06_-_WINS_Infrastructure.part07.rar
http://rapidshare.com/files/140938529/zCBT_-_06_-_WINS_Infrastructure.part08.rar
http://rapidshare.com/files/140939363/zCBT_-_06_-_WINS_Infrastructure.part01.rar
http://rapidshare.com/files/140939886/zCBT_-_06_-_WINS_Infrastructure.part02.rar
http://rapidshare.com/files/140940931/zCBT_-_06_-_WINS_Infrastructure.part03.rar
http://rapidshare.com/files/140939365/zCBT_-_06_-_WINS_Infrastructure.part04.rar
http://rapidshare.com/files/140939321/zCBT_-_06_-_WINS_Infrastructure.part05.rar
http://rapidshare.com/files/140939925/zCBT_-_06_-_WINS_Infrastructure.part06.rar
http://rapidshare.com/files/140939370/zCBT_-_06_-_WINS_Infrastructure.part07.rar
http://rapidshare.com/files/140938529/zCBT_-_06_-_WINS_Infrastructure.part08.rar
Lab 04 - DNS Infrastructures (2CD)
CODE
http://rapidshare.com/files/140938873/zCBT_-_04_-_DNS_Servers.part01.rar
http://rapidshare.com/files/140938921/zCBT_-_04_-_DNS_Servers.part02.rar
http://rapidshare.com/files/140939334/zCBT_-_04_-_DNS_Servers.part03.rar
http://rapidshare.com/files/140939332/zCBT_-_04_-_DNS_Servers.part04.rar
http://rapidshare.com/files/140940933/zCBT_-_04_-_DNS_Servers.part05.rar
http://rapidshare.com/files/140939386/zCBT_-_04_-_DNS_Servers.part06.rar
http://rapidshare.com/files/140939368/zCBT_-_04_-_DNS_Servers.part07.rar
http://rapidshare.com/files/140940896/zCBT_-_04_-_DNS_Servers.part08.rar
http://rapidshare.com/files/140939349/zCBT_-_04_-_DNS_Servers.part09.rar
http://rapidshare.com/files/140938908/zCBT_-_04_-_DNS_Servers.part10.rar
http://rapidshare.com/files/140939339/zCBT_-_04_-_DNS_Servers.part11.rar
http://rapidshare.com/files/140938873/zCBT_-_04_-_DNS_Servers.part01.rar
http://rapidshare.com/files/140938921/zCBT_-_04_-_DNS_Servers.part02.rar
http://rapidshare.com/files/140939334/zCBT_-_04_-_DNS_Servers.part03.rar
http://rapidshare.com/files/140939332/zCBT_-_04_-_DNS_Servers.part04.rar
http://rapidshare.com/files/140940933/zCBT_-_04_-_DNS_Servers.part05.rar
http://rapidshare.com/files/140939386/zCBT_-_04_-_DNS_Servers.part06.rar
http://rapidshare.com/files/140939368/zCBT_-_04_-_DNS_Servers.part07.rar
http://rapidshare.com/files/140940896/zCBT_-_04_-_DNS_Servers.part08.rar
http://rapidshare.com/files/140939349/zCBT_-_04_-_DNS_Servers.part09.rar
http://rapidshare.com/files/140938908/zCBT_-_04_-_DNS_Servers.part10.rar
http://rapidshare.com/files/140939339/zCBT_-_04_-_DNS_Servers.part11.rar
Lab 05 - DHCP Servers (2CD)
CODE
http://rapidshare.com/files/140939367/zCBT_-_05_-_DHCP_Servers.part01.rar
http://rapidshare.com/files/140939336/zCBT_-_05_-_DHCP_Servers.part02.rar
http://rapidshare.com/files/140939384/zCBT_-_05_-_DHCP_Servers.part03.rar
http://rapidshare.com/files/140939369/zCBT_-_05_-_DHCP_Servers.part04.rar
http://rapidshare.com/files/140939341/zCBT_-_05_-_DHCP_Servers.part05.rar
http://rapidshare.com/files/140940929/zCBT_-_05_-_DHCP_Servers.part06.rar
http://rapidshare.com/files/140939335/zCBT_-_05_-_DHCP_Servers.part07.rar
http://rapidshare.com/files/140939354/zCBT_-_05_-_DHCP_Servers.part08.rar
http://rapidshare.com/files/140939877/zCBT_-_05_-_DHCP_Servers.part09.rar
http://rapidshare.com/files/140938282/zCBT_-_05_-_DHCP_Servers.part10.rar
http://rapidshare.com/files/140939367/zCBT_-_05_-_DHCP_Servers.part01.rar
http://rapidshare.com/files/140939336/zCBT_-_05_-_DHCP_Servers.part02.rar
http://rapidshare.com/files/140939384/zCBT_-_05_-_DHCP_Servers.part03.rar
http://rapidshare.com/files/140939369/zCBT_-_05_-_DHCP_Servers.part04.rar
http://rapidshare.com/files/140939341/zCBT_-_05_-_DHCP_Servers.part05.rar
http://rapidshare.com/files/140940929/zCBT_-_05_-_DHCP_Servers.part06.rar
http://rapidshare.com/files/140939335/zCBT_-_05_-_DHCP_Servers.part07.rar
http://rapidshare.com/files/140939354/zCBT_-_05_-_DHCP_Servers.part08.rar
http://rapidshare.com/files/140939877/zCBT_-_05_-_DHCP_Servers.part09.rar
http://rapidshare.com/files/140938282/zCBT_-_05_-_DHCP_Servers.part10.rar
Lab 02 - File Servers (2CD)
http://rapidshare.com/files/140938866/zCBT_-_02_-_File_Servers.part01.rar
http://rapidshare.com/files/140938843/zCBT_-_02_-_File_Servers.part02.rar
http://rapidshare.com/files/140938890/zCBT_-_02_-_File_Servers.part03.rar
http://rapidshare.com/files/140938864/zCBT_-_02_-_File_Servers.part04.rar
http://rapidshare.com/files/140938858/zCBT_-_02_-_File_Servers.part05.rar
http://rapidshare.com/files/140938839/zCBT_-_02_-_File_Servers.part06.rar
http://rapidshare.com/files/140938935/zCBT_-_02_-_File_Servers.part07.rar
http://rapidshare.com/files/140938844/zCBT_-_02_-_File_Servers.part08.rar
http://rapidshare.com/files/140938849/zCBT_-_02_-_File_Servers.part09.rar
http://rapidshare.com/files/140938883/zCBT_-_02_-_File_Servers.part10.rar
http://rapidshare.com/files/140938594/zCBT_-_02_-_File_Servers.part11.rar
http://rapidshare.com/files/140938843/zCBT_-_02_-_File_Servers.part02.rar
http://rapidshare.com/files/140938890/zCBT_-_02_-_File_Servers.part03.rar
http://rapidshare.com/files/140938864/zCBT_-_02_-_File_Servers.part04.rar
http://rapidshare.com/files/140938858/zCBT_-_02_-_File_Servers.part05.rar
http://rapidshare.com/files/140938839/zCBT_-_02_-_File_Servers.part06.rar
http://rapidshare.com/files/140938935/zCBT_-_02_-_File_Servers.part07.rar
http://rapidshare.com/files/140938844/zCBT_-_02_-_File_Servers.part08.rar
http://rapidshare.com/files/140938849/zCBT_-_02_-_File_Servers.part09.rar
http://rapidshare.com/files/140938883/zCBT_-_02_-_File_Servers.part10.rar
http://rapidshare.com/files/140938594/zCBT_-_02_-_File_Servers.part11.rar
Lab 03 - Web Servers (2CD)
CODE
http://rapidshare.com/files/140938932/zCBT_-_03_-_Web_Servers.part01.rar
http://rapidshare.com/files/140938862/zCBT_-_03_-_Web_Servers.part02.rar
http://rapidshare.com/files/140938842/zCBT_-_03_-_Web_Servers.part03.rar
http://rapidshare.com/files/140938898/zCBT_-_03_-_Web_Servers.part04.rar
http://rapidshare.com/files/140938860/zCBT_-_03_-_Web_Servers.part05.rar
http://rapidshare.com/files/140938857/zCBT_-_03_-_Web_Servers.part06.rar
http://rapidshare.com/files/140938918/zCBT_-_03_-_Web_Servers.part07.rar
http://rapidshare.com/files/140938922/zCBT_-_03_-_Web_Servers.part08.rar
http://rapidshare.com/files/140938876/zCBT_-_03_-_Web_Servers.part09.rar
http://rapidshare.com/files/140938666/zCBT_-_03_-_Web_Servers.part10.rar
http://rapidshare.com/files/140938932/zCBT_-_03_-_Web_Servers.part01.rar
http://rapidshare.com/files/140938862/zCBT_-_03_-_Web_Servers.part02.rar
http://rapidshare.com/files/140938842/zCBT_-_03_-_Web_Servers.part03.rar
http://rapidshare.com/files/140938898/zCBT_-_03_-_Web_Servers.part04.rar
http://rapidshare.com/files/140938860/zCBT_-_03_-_Web_Servers.part05.rar
http://rapidshare.com/files/140938857/zCBT_-_03_-_Web_Servers.part06.rar
http://rapidshare.com/files/140938918/zCBT_-_03_-_Web_Servers.part07.rar
http://rapidshare.com/files/140938922/zCBT_-_03_-_Web_Servers.part08.rar
http://rapidshare.com/files/140938876/zCBT_-_03_-_Web_Servers.part09.rar
http://rapidshare.com/files/140938666/zCBT_-_03_-_Web_Servers.part10.rar
Lab 01 - Active Directory (2CD)
CODE
http://rapidshare.com/files/140937605/zCBT_-_01_-_Active_Directory.part01.rar
http://rapidshare.com/files/140937575/zCBT_-_01_-_Active_Directory.part02.rar
http://rapidshare.com/files/140937606/zCBT_-_01_-_Active_Directory.part03.rar
http://rapidshare.com/files/140937578/zCBT_-_01_-_Active_Directory.part04.rar
http://rapidshare.com/files/140937581/zCBT_-_01_-_Active_Directory.part05.rar
http://rapidshare.com/files/140937596/zCBT_-_01_-_Active_Directory.part06.rar
http://rapidshare.com/files/140937623/zCBT_-_01_-_Active_Directory.part07.rar
http://rapidshare.com/files/140937595/zCBT_-_01_-_Active_Directory.part08.rar
http://rapidshare.com/files/140937584/zCBT_-_01_-_Active_Directory.part09.rar
http://rapidshare.com/files/140937607/zCBT_-_01_-_Active_Directory.part10.rar
http://rapidshare.com/files/140938944/zCBT_-_01_-_Active_Directory.part11.rar
http://rapidshare.com/files/140938270/zCBT_-_01_-_Active_Directory.part12.rar
http://rapidshare.com/files/140937605/zCBT_-_01_-_Active_Directory.part01.rar
http://rapidshare.com/files/140937575/zCBT_-_01_-_Active_Directory.part02.rar
http://rapidshare.com/files/140937606/zCBT_-_01_-_Active_Directory.part03.rar
http://rapidshare.com/files/140937578/zCBT_-_01_-_Active_Directory.part04.rar
http://rapidshare.com/files/140937581/zCBT_-_01_-_Active_Directory.part05.rar
http://rapidshare.com/files/140937596/zCBT_-_01_-_Active_Directory.part06.rar
http://rapidshare.com/files/140937623/zCBT_-_01_-_Active_Directory.part07.rar
http://rapidshare.com/files/140937595/zCBT_-_01_-_Active_Directory.part08.rar
http://rapidshare.com/files/140937584/zCBT_-_01_-_Active_Directory.part09.rar
http://rapidshare.com/files/140937607/zCBT_-_01_-_Active_Directory.part10.rar
http://rapidshare.com/files/140938944/zCBT_-_01_-_Active_Directory.part11.rar
http://rapidshare.com/files/140938270/zCBT_-_01_-_Active_Directory.part12.rar
Saturday, September 20, 2008
Easy move through Powerpoint
Apply subscript formatting - CTRL+EQUAL SIGN (=)
Apply superscript formatting - CTRL+PLUS SIGN (+)
Bold - CTRL+B
Capitalize - SHIFT+F3
Copy - CTRL+C
Delete a word - CTRL+BACKSPACE
Demote a paragraph - ALT+SHIFT+RIGHT ARROW
Find - CTRL+F
Insert a hyperlink - CTRL+K
Insert a new slide - CTRL+M
Italicize - CTRL+I
Make a duplicate of the current slide - CTRL+D
Open - CTRL+O
Open the Font dialog box - CTRL+T
Paste - CTRL+V
Print - CTRL+P
Promote a paragraph - ALT+SHIFT+LEFT ARROW
Repeat your last action - F4 or CTRL+Y
Save - CTRL+S
Select all - CTRL+A
Start a slide show - F5
Switch to the next pane (clockwise) - F6
Switch to the previous pane - SHIFT+F6
Undo - CTRL+Z
View guides - CTRL+G
Apply superscript formatting - CTRL+PLUS SIGN (+)
Bold - CTRL+B
Capitalize - SHIFT+F3
Copy - CTRL+C
Delete a word - CTRL+BACKSPACE
Demote a paragraph - ALT+SHIFT+RIGHT ARROW
Find - CTRL+F
Insert a hyperlink - CTRL+K
Insert a new slide - CTRL+M
Italicize - CTRL+I
Make a duplicate of the current slide - CTRL+D
Open - CTRL+O
Open the Font dialog box - CTRL+T
Paste - CTRL+V
Print - CTRL+P
Promote a paragraph - ALT+SHIFT+LEFT ARROW
Repeat your last action - F4 or CTRL+Y
Save - CTRL+S
Select all - CTRL+A
Start a slide show - F5
Switch to the next pane (clockwise) - F6
Switch to the previous pane - SHIFT+F6
Undo - CTRL+Z
View guides - CTRL+G
Window XP Hidden Applications Shortcuts
To run any of these apps go to Start > Run and type the executable name:
1) Character Map = charmap.exe (very useful for finding unusual characters)
2) Disk Cleanup = cleanmgr.exe
3) Clipboard Viewer = clipbrd.exe (views contents of Windows clipboard)
4) Dr Watson = drwtsn32.exe (Troubleshooting tool)
5) DirectX diagnosis = dxdiag.exe (Diagnose & test DirectX, video & sound cards)
6) Private character editor = eudcedit.exe (allows creation or modification of characters)
7) IExpress Wizard = iexpress.exe (Create self-extracting / self-installing package)
8) Microsoft Synchronization Manager = mobsync.exe (appears to allow synchronization of files on the network for when working offline. Apparently undocumented).
9) Windows Media Player 5.1 = mplay32.exe (Retro version of Media Player, very basic).
10) ODBC Data Source Administrator = odbcad32.exe (something to do with databases)
11) Object Packager = packager.exe (to do with packaging objects for insertion in files, appears to have comprehensive help files).
12) System Monitor = perfmon.exe (very useful, highly configurable tool, tells you everything you ever wanted to know about any aspect of PC performance, for uber-geeks only )
13) Program Manager = progman.exe (Legacy Windows 3.x desktop shell).
14) Remote Access phone book = rasphone.exe (documentation is virtually non-existant).
15) Registry Editor = regedt32.exe [also regedit.exe] (for hacking the Windows Registry).
16) Network shared folder wizard = shrpubw.exe (creates shared folders on network).
17) File siganture verification tool = sigverif.exe
18) Volume Control = sndvol32.exe (I've included this for those people that lose it from the System Notification area).
19) System Configuration Editor = sysedit.exe (modify System.ini & Win.ini just like in Win98! ).
20) Syskey = syskey.exe (Secures XP Account database - use with care, it's virtually undocumented but it appears to encrypt all passwords, I'm not sure of the full implications).
21) Microsoft Telnet Client = telnet.exe
22) Driver Verifier Manager = verifier.exe (seems to be a utility for monitoring the actions of drivers, might be useful for people having driver problems. Undocumented).
23) Windows for Workgroups Chat = winchat.exe (appears to be an old NT utility to allow chat sessions over a LAN, help files available).
1) Character Map = charmap.exe (very useful for finding unusual characters)
2) Disk Cleanup = cleanmgr.exe
3) Clipboard Viewer = clipbrd.exe (views contents of Windows clipboard)
4) Dr Watson = drwtsn32.exe (Troubleshooting tool)
5) DirectX diagnosis = dxdiag.exe (Diagnose & test DirectX, video & sound cards)
6) Private character editor = eudcedit.exe (allows creation or modification of characters)
7) IExpress Wizard = iexpress.exe (Create self-extracting / self-installing package)
8) Microsoft Synchronization Manager = mobsync.exe (appears to allow synchronization of files on the network for when working offline. Apparently undocumented).
9) Windows Media Player 5.1 = mplay32.exe (Retro version of Media Player, very basic).
10) ODBC Data Source Administrator = odbcad32.exe (something to do with databases)
11) Object Packager = packager.exe (to do with packaging objects for insertion in files, appears to have comprehensive help files).
12) System Monitor = perfmon.exe (very useful, highly configurable tool, tells you everything you ever wanted to know about any aspect of PC performance, for uber-geeks only )
13) Program Manager = progman.exe (Legacy Windows 3.x desktop shell).
14) Remote Access phone book = rasphone.exe (documentation is virtually non-existant).
15) Registry Editor = regedt32.exe [also regedit.exe] (for hacking the Windows Registry).
16) Network shared folder wizard = shrpubw.exe (creates shared folders on network).
17) File siganture verification tool = sigverif.exe
18) Volume Control = sndvol32.exe (I've included this for those people that lose it from the System Notification area).
19) System Configuration Editor = sysedit.exe (modify System.ini & Win.ini just like in Win98! ).
20) Syskey = syskey.exe (Secures XP Account database - use with care, it's virtually undocumented but it appears to encrypt all passwords, I'm not sure of the full implications).
21) Microsoft Telnet Client = telnet.exe
22) Driver Verifier Manager = verifier.exe (seems to be a utility for monitoring the actions of drivers, might be useful for people having driver problems. Undocumented).
23) Windows for Workgroups Chat = winchat.exe (appears to be an old NT utility to allow chat sessions over a LAN, help files available).
Important Word Shortcuts
All Caps - CTRL+SHIFT+A
Annotation - ALT+CTRL+M
Auto Format - ALT+CTRL+K
Auto Text - F3 or ALT+CTRL+V
Bold - CTRL+B or CTRL+SHIFT+B
Bookmark - CTRL+SHIFT+F5
Copy - CTRL+C or CTRL+INSERT
Copy Format - CTRL+SHIFT+C
Copy Text - SHIFT+F2
Create Auto Text - ALT+F3
Date Field - ALT+SHIFT+D
Delete Back Word - CTRL+BACKSPACE
Delete Word - CTRL+DELETE
Dictionary - ALT+SHIFT+F7
Do Field Click - ALT+SHIFT+F9
Doc Maximize - CTRL+F10
Doc Move - CTRL+F7
Doc Restore - CTRL+F5
Doc Size - CTRL+F8
Grow Font - CTRL+SHIFT+.
Grow Font One Point - CTRL+]Hanging Indent - CTRL+T
Header Footer Link - ALT+SHIFT+R
Help - F1
Hidden - CTRL+SHIFT+H
Hyperlink - CTRL+K
Indent - CTRL+M
Italic - CTRL+I or CTRL+SHIFT+I
Justify Para - CTRL+J
Left Para - CTRL+L
Line Up Extend - SHIFT+UP
List Num Field - ALT+CTRL+L
Outline - ALT+CTRL+O
Outline Collapse - ALT+SHIFT+- or ALT+SHIFT+NUM -
Outline Demote - ALT+SHIFT+RIGHT
Outline Expand - ALT+SHIFT+=
Outline Expand - ALT+SHIFT+NUM +
Outline Move Down - ALT+SHIFT+DOWN
Outline Move Up - ALT+SHIFT+UP
Outline Promote - ALT+SHIFT+LEFT
Outline Show First Line - ALT+SHIFT+L
Lock Fields - CTRL+3 or CTRL+F11
Web Go Back - ALT+LEFT
Web Go Forward - ALT+RIGHT
Word Left - CTRL+LEFT
Word Left Extend - CTRL+SHIFT+LEFT
Word Right - CTRL+RIGHT
Annotation - ALT+CTRL+M
Auto Format - ALT+CTRL+K
Auto Text - F3 or ALT+CTRL+V
Bold - CTRL+B or CTRL+SHIFT+B
Bookmark - CTRL+SHIFT+F5
Copy - CTRL+C or CTRL+INSERT
Copy Format - CTRL+SHIFT+C
Copy Text - SHIFT+F2
Create Auto Text - ALT+F3
Date Field - ALT+SHIFT+D
Delete Back Word - CTRL+BACKSPACE
Delete Word - CTRL+DELETE
Dictionary - ALT+SHIFT+F7
Do Field Click - ALT+SHIFT+F9
Doc Maximize - CTRL+F10
Doc Move - CTRL+F7
Doc Restore - CTRL+F5
Doc Size - CTRL+F8
Grow Font - CTRL+SHIFT+.
Grow Font One Point - CTRL+]Hanging Indent - CTRL+T
Header Footer Link - ALT+SHIFT+R
Help - F1
Hidden - CTRL+SHIFT+H
Hyperlink - CTRL+K
Indent - CTRL+M
Italic - CTRL+I or CTRL+SHIFT+I
Justify Para - CTRL+J
Left Para - CTRL+L
Line Up Extend - SHIFT+UP
List Num Field - ALT+CTRL+L
Outline - ALT+CTRL+O
Outline Collapse - ALT+SHIFT+- or ALT+SHIFT+NUM -
Outline Demote - ALT+SHIFT+RIGHT
Outline Expand - ALT+SHIFT+=
Outline Expand - ALT+SHIFT+NUM +
Outline Move Down - ALT+SHIFT+DOWN
Outline Move Up - ALT+SHIFT+UP
Outline Promote - ALT+SHIFT+LEFT
Outline Show First Line - ALT+SHIFT+L
Lock Fields - CTRL+3 or CTRL+F11
Web Go Back - ALT+LEFT
Web Go Forward - ALT+RIGHT
Word Left - CTRL+LEFT
Word Left Extend - CTRL+SHIFT+LEFT
Word Right - CTRL+RIGHT
Excel Time saving Shortcuts
Move to next cell in row - Tab
Move to previous cell in row - Shift + Tab
Up one screen - Page Up
Down one screen - Page Down
Move to next worksheet - Ctrl + Page Down
Move to previous worksheet - Ctrl + Page Up
Go to first cell in data region - Ctrl + Home
Go to last cell in data region - Ctrl + End
Bold toggle for selection - Ctrl + B
Italic toggle for selection - Ctrl + I
Underline toggle for selection - Ctrl + U
Strikethrough for selection - Ctrl + 5
Change the font - Ctrl + Shift + F
Change the font size - Ctrl + Shift + P
Apply outline borders - Ctrl + Shift + 7
Remove all borders - Ctrl + Shift + Underline
Wrap text in same cell - Alt + Enter
Format cells - Ctrl + 1
Select font - Ctrl + Shift + F
Select point size - Ctrl + Shift + P
Format as currency - Ctrl + Shift + 4
Format as general - Ctrl + Shift + # (hash sign)
Format as percentage - Ctrl + Shift + 5
Format as number - Ctrl + Shift + 1
Autosum a range of cells - Alt + Equals Sign
Insert the date - Ctrl +; (semi-colon)
Insert the time - Ctrl + Shift +; (semi-colon)
Insert columns/rows - Ctrl + Shift + + (plus sign)
Insert a new worksheet - Shift + F11
Read Monitor Cell One - Alt + Shift + 1
Read Monitor Cell Two - Alt + Shift + 2
Read Monitor Cell Three - Alt + Shift + 3
Read Monitor Cell Four - Alt + Shift + 4
List Visible Cells With Data - Ctrl + Shift + D
Lists Data In Current Column - Ctrl + Shift + C
List Data In Current Row - Ctrl + Shift + R
Select Hyperlink - Ctrl + Shift + H
Move To Worksheet Listbox - Ctrl + Shift + S
Move To Monitor Cell - Ctrl + Shift + M
Select Worksheet Objects - Ctrl + Shift + O
List Cells At Page Breaks - Ctrl + Shift + B
Options Listbox - Insert + V
Move to previous cell in row - Shift + Tab
Up one screen - Page Up
Down one screen - Page Down
Move to next worksheet - Ctrl + Page Down
Move to previous worksheet - Ctrl + Page Up
Go to first cell in data region - Ctrl + Home
Go to last cell in data region - Ctrl + End
Bold toggle for selection - Ctrl + B
Italic toggle for selection - Ctrl + I
Underline toggle for selection - Ctrl + U
Strikethrough for selection - Ctrl + 5
Change the font - Ctrl + Shift + F
Change the font size - Ctrl + Shift + P
Apply outline borders - Ctrl + Shift + 7
Remove all borders - Ctrl + Shift + Underline
Wrap text in same cell - Alt + Enter
Format cells - Ctrl + 1
Select font - Ctrl + Shift + F
Select point size - Ctrl + Shift + P
Format as currency - Ctrl + Shift + 4
Format as general - Ctrl + Shift + # (hash sign)
Format as percentage - Ctrl + Shift + 5
Format as number - Ctrl + Shift + 1
Autosum a range of cells - Alt + Equals Sign
Insert the date - Ctrl +; (semi-colon)
Insert the time - Ctrl + Shift +; (semi-colon)
Insert columns/rows - Ctrl + Shift + + (plus sign)
Insert a new worksheet - Shift + F11
Read Monitor Cell One - Alt + Shift + 1
Read Monitor Cell Two - Alt + Shift + 2
Read Monitor Cell Three - Alt + Shift + 3
Read Monitor Cell Four - Alt + Shift + 4
List Visible Cells With Data - Ctrl + Shift + D
Lists Data In Current Column - Ctrl + Shift + C
List Data In Current Row - Ctrl + Shift + R
Select Hyperlink - Ctrl + Shift + H
Move To Worksheet Listbox - Ctrl + Shift + S
Move To Monitor Cell - Ctrl + Shift + M
Select Worksheet Objects - Ctrl + Shift + O
List Cells At Page Breaks - Ctrl + Shift + B
Options Listbox - Insert + V
Internet Explorer Shortcuts:
CTRL+A - Select all items on the current page
CTRL+D - Add the current page to your Favorites
CTRL+E - Open the Search bar
CTRL+F - Find on this page
CTRL+H - Open the History bar
CTRL+I - Open the Favorites bar
CTRL+N - Open a new window
CTRL+O - Go to a new location
CTRL+P - Print the current page or active frame
CTRL+S - Save the current page
CTRL+W - Close current browser window
CTRL+ENTER - Adds the http://www. (url) .com
SHIFT+CLICK - Open link in new window
BACKSPACE - Go to the previous page
ALT+HOME - Go to your Home page
HOME - Move to the beginning of a document
TAB - Move forward through items on a page
END - Move to the end of a document
ESC - Stop downloading a page
F11 - Toggle full-screen view
F5 - Refresh the current page
F4 - Display list of typed addresses
F6 - Change Address bar and page focus
ALT+RIGHT ARROW - Go to the next page
SHIFT+CTRL+TAB - Move back between frames
SHIFT+F10 - Display a shortcut menu for a link
SHIFT+TAB - Move back through the items on a page
CTRL+TAB - Move forward between frames
CTRL+C - Copy selected items to the clipboard
CTRL+V - Insert contents of the clipboard
ENTER - Activate a selected link
HOME - Move to the beginning of a document
END - Move to the end of a document
F1 - Display Internet Explorer Help
CTRL+D - Add the current page to your Favorites
CTRL+E - Open the Search bar
CTRL+F - Find on this page
CTRL+H - Open the History bar
CTRL+I - Open the Favorites bar
CTRL+N - Open a new window
CTRL+O - Go to a new location
CTRL+P - Print the current page or active frame
CTRL+S - Save the current page
CTRL+W - Close current browser window
CTRL+ENTER - Adds the http://www. (url) .com
SHIFT+CLICK - Open link in new window
BACKSPACE - Go to the previous page
ALT+HOME - Go to your Home page
HOME - Move to the beginning of a document
TAB - Move forward through items on a page
END - Move to the end of a document
ESC - Stop downloading a page
F11 - Toggle full-screen view
F5 - Refresh the current page
F4 - Display list of typed addresses
F6 - Change Address bar and page focus
ALT+RIGHT ARROW - Go to the next page
SHIFT+CTRL+TAB - Move back between frames
SHIFT+F10 - Display a shortcut menu for a link
SHIFT+TAB - Move back through the items on a page
CTRL+TAB - Move forward between frames
CTRL+C - Copy selected items to the clipboard
CTRL+V - Insert contents of the clipboard
ENTER - Activate a selected link
HOME - Move to the beginning of a document
END - Move to the end of a document
F1 - Display Internet Explorer Help
Windows Explorer Shortcuts:
ALT+SPACEBAR - Display the current window’s system menu
SHIFT+F10 - Display the item's context menu
CTRL+ESC - Display the Start menu
ALT+TAB - Switch to the window you last used
ALT+F4 - Close the current window or quit
CTRL+A - Select all items
CTRL+X - Cut selected item(s)
CTRL+C - Copy selected item(s)
CTRL+V - Paste item(s)
CTRL+Z - Undo last action
CTRL+(+) - Automatically resize the columns in the right hand pane
TAB - Move forward through options
ALT+RIGHT ARROW - Move forward to a previous view
ALT+LEFT ARROW - Move backward to a previous view
SHIFT+DELETE - Delete an item immediately
BACKSPACE - View the folder one level up
ALT+ENTER - View an item’s properties
F10 - Activate the menu bar in programs
F6 - Switch between left and right panes
F5 - Refresh window contents
F3 - Display Find application
F2 - Rename selected item
SHIFT+F10 - Display the item's context menu
CTRL+ESC - Display the Start menu
ALT+TAB - Switch to the window you last used
ALT+F4 - Close the current window or quit
CTRL+A - Select all items
CTRL+X - Cut selected item(s)
CTRL+C - Copy selected item(s)
CTRL+V - Paste item(s)
CTRL+Z - Undo last action
CTRL+(+) - Automatically resize the columns in the right hand pane
TAB - Move forward through options
ALT+RIGHT ARROW - Move forward to a previous view
ALT+LEFT ARROW - Move backward to a previous view
SHIFT+DELETE - Delete an item immediately
BACKSPACE - View the folder one level up
ALT+ENTER - View an item’s properties
F10 - Activate the menu bar in programs
F6 - Switch between left and right panes
F5 - Refresh window contents
F3 - Display Find application
F2 - Rename selected item
Run Commands:
compmgmt.msc - Computer management
devmgmt.msc - Device manager
diskmgmt.msc - Disk management
dfrg.msc - Disk defrag
eventvwr.msc - Event viewer
fsmgmt.msc - Shared folders
gpedit.msc - Group policies
lusrmgr.msc - Local users and groups
perfmon.msc - Performance monitor
rsop.msc - Resultant set of policies
secpol.msc - Local security settings
services.msc - Various Services
msconfig - System Configuration Utility
regedit - Registry Editor
msinfo32 _ System Information
sysedit _ System Edit
win.ini _ windows loading information(also system.ini)
winver _ Shows current version of windows
mailto: _ Opens default email client
command _ Opens command prompt
devmgmt.msc - Device manager
diskmgmt.msc - Disk management
dfrg.msc - Disk defrag
eventvwr.msc - Event viewer
fsmgmt.msc - Shared folders
gpedit.msc - Group policies
lusrmgr.msc - Local users and groups
perfmon.msc - Performance monitor
rsop.msc - Resultant set of policies
secpol.msc - Local security settings
services.msc - Various Services
msconfig - System Configuration Utility
regedit - Registry Editor
msinfo32 _ System Information
sysedit _ System Edit
win.ini _ windows loading information(also system.ini)
winver _ Shows current version of windows
mailto: _ Opens default email client
command _ Opens command prompt
Windows XP Shortcuts:
ALT+- (ALT+hyphen) Displays the Multiple Document Interface (MDI) child window's System menu
ALT+ENTER View properties for the selected item
ALT+ESC Cycle through items in the order they were opened
ALT+F4 Close the active item, or quit the active program
ALT+SPACEBAR Display the System menu for the active window
ALT+TAB Switch between open items
ALT+Underlined letter Display the corresponding menu
BACKSPACE View the folder one level up in My Computer or Windows Explorer
CTRL+A Select all
CTRL+B Bold
CTRL+C Copy
CTRL+I Italics
CTRL+O Open an item
CTRL+U Underline
CTRL+V Paste
CTRL+X Cut
CTRL+Z Undo
CTRL+F4 Close the active document
CTRL while dragging Copy selected item
CTRL+SHIFT while dragging Create shortcut to selected iteM
CTRL+RIGHT ARROW Move the insertion point to the beginning of the next word
CTRL+LEFT ARROW Move the insertion point to the beginning of the previous word
CTRL+DOWN ARROW Move the insertion point to the beginning of the next paragraph
CTRL+UP ARROW Move the insertion point to the beginning of the previous paragraph
SHIFT+DELETE Delete selected item permanently without placing the item in the Recycle Bin
ESC Cancel the current task
F1 Displays Help
F2 Rename selected item
F3 Search for a file or folder
F4 Display the Address bar list in My Computer or Windows Explorer
F5 Refresh the active window
F6 Cycle through screen elements in a window or on the desktop
F10 Activate the menu bar in the active program
SHIFT+F10 Display the shortcut menu for the selected item
CTRL+ESC Display the Start menu
SHIFT+CTRL+ESC Launches Task Manager
SHIFT when you insert a CD Prevent the CD from automatically playing
WIN Display or hide the Start menu
WIN+BREAK Display the System Properties dialog box
WIN+D Minimizes all Windows and shows the Desktop
WIN+E Open Windows Explorer
WIN+F Search for a file or folder
WIN+F+CTRL Search for computers
WIN+L Locks the desktop
WIN+M Minimize or restore all windows
WIN+R Open the Run dialog box
WIN+TAB Switch between open items
ALT+ENTER View properties for the selected item
ALT+ESC Cycle through items in the order they were opened
ALT+F4 Close the active item, or quit the active program
ALT+SPACEBAR Display the System menu for the active window
ALT+TAB Switch between open items
ALT+Underlined letter Display the corresponding menu
BACKSPACE View the folder one level up in My Computer or Windows Explorer
CTRL+A Select all
CTRL+B Bold
CTRL+C Copy
CTRL+I Italics
CTRL+O Open an item
CTRL+U Underline
CTRL+V Paste
CTRL+X Cut
CTRL+Z Undo
CTRL+F4 Close the active document
CTRL while dragging Copy selected item
CTRL+SHIFT while dragging Create shortcut to selected iteM
CTRL+RIGHT ARROW Move the insertion point to the beginning of the next word
CTRL+LEFT ARROW Move the insertion point to the beginning of the previous word
CTRL+DOWN ARROW Move the insertion point to the beginning of the next paragraph
CTRL+UP ARROW Move the insertion point to the beginning of the previous paragraph
SHIFT+DELETE Delete selected item permanently without placing the item in the Recycle Bin
ESC Cancel the current task
F1 Displays Help
F2 Rename selected item
F3 Search for a file or folder
F4 Display the Address bar list in My Computer or Windows Explorer
F5 Refresh the active window
F6 Cycle through screen elements in a window or on the desktop
F10 Activate the menu bar in the active program
SHIFT+F10 Display the shortcut menu for the selected item
CTRL+ESC Display the Start menu
SHIFT+CTRL+ESC Launches Task Manager
SHIFT when you insert a CD Prevent the CD from automatically playing
WIN Display or hide the Start menu
WIN+BREAK Display the System Properties dialog box
WIN+D Minimizes all Windows and shows the Desktop
WIN+E Open Windows Explorer
WIN+F Search for a file or folder
WIN+F+CTRL Search for computers
WIN+L Locks the desktop
WIN+M Minimize or restore all windows
WIN+R Open the Run dialog box
WIN+TAB Switch between open items
Run Commands To Access The Control Panel:
Add/Remove Programs control appwiz.cpl
Date/Time Properties control timedate.cpl
Display Properties control desk.cpl
FindFast control findfast.cpl
Fonts Folder control fonts
Internet Properties control inetcpl.cpl
Keyboard Properties control main.cpl keyboard
Mouse Properties control main.cpl
Multimedia Properties control mmsys.cpl
Network Properties control netcpl.cpl
Password Properties control password.cpl
Printers Folder control printers
Sound Properties control mmsys.cpl sounds
System Properties control sysdm.cpl
Date/Time Properties control timedate.cpl
Display Properties control desk.cpl
FindFast control findfast.cpl
Fonts Folder control fonts
Internet Properties control inetcpl.cpl
Keyboard Properties control main.cpl keyboard
Mouse Properties control main.cpl
Multimedia Properties control mmsys.cpl
Network Properties control netcpl.cpl
Password Properties control password.cpl
Printers Folder control printers
Sound Properties control mmsys.cpl sounds
System Properties control sysdm.cpl
Saturday, September 13, 2008
Find the windows XP Key from CD
We can get the Win XP's Product key from CD
Open XP Installation CD, Explore i386 folder and find UNATTEND.txt file and open it. Goto end and find the CD Key.
Open XP Installation CD, Explore i386 folder and find UNATTEND.txt file and open it. Goto end and find the CD Key.
Disabling the ability to click on My Computer
You can restrict any user to access your system drives if you disable the click feature on My Computer. User will get no any changes when he will try to open My Computer.
By editing the windows registry keys, you can disable the click feature on My Computer.
Follow the given steps to disable My Computer setting.
1]First click on Start button then type Regedit in Run option.
2]In registry editor panel search the value
20D04FE0-3AEA-1069-A2D8-08002B30309D
3]May be you will find this value on path HKey_Classes_Root \ CLSID section.
4]Here delete the entire section of this value.
5]Now close the registry editor and restart your computer after any changes to go into effect.
By editing the windows registry keys, you can disable the click feature on My Computer.
Follow the given steps to disable My Computer setting.
1]First click on Start button then type Regedit in Run option.
2]In registry editor panel search the value
20D04FE0-3AEA-1069-A2D8-08002B30309D
3]May be you will find this value on path HKey_Classes_Root \ CLSID section.
4]Here delete the entire section of this value.
5]Now close the registry editor and restart your computer after any changes to go into effect.
Disable the Security Center warnings
Follow the given steps to edit the computer registry for disable message:
First click on Start button then type Regedit in Run option.
Here locate the location to:
• HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
Here in right side panel, double click on Anti Virus Disable Notify and set its value 1.
Now close the registry editor and restart your computer after any changes to go into effect.
First click on Start button then type Regedit in Run option.
Here locate the location to:
• HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
Here in right side panel, double click on Anti Virus Disable Notify and set its value 1.
Now close the registry editor and restart your computer after any changes to go into effect.
Turning off the Help on Min, Max, Close Icons
When the mouse goes over the minimize, maximize and close icons on the upper right hand side of a window, you normally get a display telling you want those are for.
To disable that display:
1. Start Regedit
2. Go to HKEY_CURRENT_USER \ Control Panel \ Desktop
3. Create a String Value called MinMaxClose
4. Give it a value of 1
5. Reboot
To disable that display:
1. Start Regedit
2. Go to HKEY_CURRENT_USER \ Control Panel \ Desktop
3. Create a String Value called MinMaxClose
4. Give it a value of 1
5. Reboot
Remove Task Manager has been disabled by your Administrator
Method to Remove Task Manager has been disabled by your Administrator
You have to use Group Policy Editor for Windows XP Professional
• Click Start>Run>type gpedit.msc and click OK.
• Navigate to this line:
User Configuration >> Administrative Templates >> System >> Ctrl+Alt+Delete Options >> Remove Task Manager
• Double-click the Remove Task Manager option.
• Set the policy to “Not Configured”.
You have to use Group Policy Editor for Windows XP Professional
• Click Start>Run>type gpedit.msc and click OK.
• Navigate to this line:
User Configuration >> Administrative Templates >> System >> Ctrl+Alt+Delete Options >> Remove Task Manager
• Double-click the Remove Task Manager option.
• Set the policy to “Not Configured”.
Change your Internet Explorer Title
1]Go to Start--->Run--->Type Regedit--->Go through the path given below
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
2]Modify/Create the Value Name [Window Title] according to the Value Data listed below.
Data Type: REG_SZ [String Value] // Value Name: Window Title Value Data: [Enter The Text Desired In Title Bar]
3]Exit Registry and Reboot
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
2]Modify/Create the Value Name [Window Title] according to the Value Data listed below.
Data Type: REG_SZ [String Value] // Value Name: Window Title Value Data: [Enter The Text Desired In Title Bar]
3]Exit Registry and Reboot
SOME HIDDEN THINGS IN WINDOW XP
1. INSTALLER MUSIC :Start>run>"c:\\windows\system32\oobe\images\title.wma">hit enter
2. HIBERNATE :Start>turn off computer>press shift key to change the "Stand By" button to hibernate
3. HIDDEN DEVICES :Control pannel >system>hardware>device manager>select "view" and show hidden device
4. CHARACTER MAP :Start>run>"charmap.exe">ok
5. CLIPBOARD VIEWERS :Start>run>"clipbrd.exe">ok
6. Dr. WATSON :Start>run>"drwtsn32.exe">ok
7. IEXPREE WIZARD :Start>run>"iexpress.exe">ok
8. WINDOW MEDIA PLAYER 5.1 :Start>run>"mplay32.exe">ok
8. WINDOW MEDIA PLAYER 6.4 :Start>run>"mplayer2.exe">ok
9. ODBC DATA SOURCE ADMINIS. :Start>run>"odbcad32.exe">ok
10.OBJECT PACKAGER :Start>run>"packager.exe">ok
11.SYATEM MONITOR :Start>run>"perfmon.exe">ok
12.NTW SHARE FOLDER WIZARD :Start>run>"shrpuwb.exe:>ok
13.FILE SIGNATURE VERI. TOOL :Start>run>"sigverif.exe">ok
14.SYS CONFIGURATION EDITOR :Start>run>"sysedit.exe">ok
15.DRIVER VERIFIER MANAGER :Start>run>"verifier.exe">ok
16.WINDOWS 4 WORKGROUP CHAT :Start>run>"winchat.exe">ok
17.PRIVAET CHRACTER OR GRAPHIC EDITOR :Start>run>:eudcedit">ok
18.ADD OR REMOVE PROGRAMS :Start>run>:appwiz.cpl">ok
19.DIRECT X DIAGANOSIS :Start>run>:dxdiag">ok
Note : The application will open without typing the ".exe" extension
Eg: Just type "mplay32" on run
2. HIBERNATE :Start>turn off computer>press shift key to change the "Stand By" button to hibernate
3. HIDDEN DEVICES :Control pannel >system>hardware>device manager>select "view" and show hidden device
4. CHARACTER MAP :Start>run>"charmap.exe">ok
5. CLIPBOARD VIEWERS :Start>run>"clipbrd.exe">ok
6. Dr. WATSON :Start>run>"drwtsn32.exe">ok
7. IEXPREE WIZARD :Start>run>"iexpress.exe">ok
8. WINDOW MEDIA PLAYER 5.1 :Start>run>"mplay32.exe">ok
8. WINDOW MEDIA PLAYER 6.4 :Start>run>"mplayer2.exe">ok
9. ODBC DATA SOURCE ADMINIS. :Start>run>"odbcad32.exe">ok
10.OBJECT PACKAGER :Start>run>"packager.exe">ok
11.SYATEM MONITOR :Start>run>"perfmon.exe">ok
12.NTW SHARE FOLDER WIZARD :Start>run>"shrpuwb.exe:>ok
13.FILE SIGNATURE VERI. TOOL :Start>run>"sigverif.exe">ok
14.SYS CONFIGURATION EDITOR :Start>run>"sysedit.exe">ok
15.DRIVER VERIFIER MANAGER :Start>run>"verifier.exe">ok
16.WINDOWS 4 WORKGROUP CHAT :Start>run>"winchat.exe">ok
17.PRIVAET CHRACTER OR GRAPHIC EDITOR :Start>run>:eudcedit">ok
18.ADD OR REMOVE PROGRAMS :Start>run>:appwiz.cpl">ok
19.DIRECT X DIAGANOSIS :Start>run>:dxdiag">ok
Note : The application will open without typing the ".exe" extension
Eg: Just type "mplay32" on run
DISPLAY A LEGAL NOTICE ON STARTUP
Wanna tell your friends about the do's and dont's in your computer when they login in your absence. Well you can do it pretty easily by displaying a legal notice at system start up.FOLLOW THESE SIMPLE STEPS:
START-> RUN -> REGEDIT
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system
"legalnoticecaption"="enter your notice caption"
"legalnoticetext"="enter your legal notice text"
START-> RUN -> REGEDIT
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system
"legalnoticecaption"="enter your notice caption"
"legalnoticetext"="enter your legal notice text"
Subscribe to:
Posts (Atom)
DISCLAIMER
WE USE LINKS TO SITES AND NOT DIRECT DOWNLOAD LINKS. THERE NO FILES HOSTED ON OUR SERVER,THEY ARE ONLY INDEXED MUCH LIKE GOOGLEWORKS.The hosting server or the administrator cannot be held responsible for the contents of any linked sites or any link contained in a linked site, or changes / updates to such sites.
BY ENTERING THIS SITE YOU AGREE TO BE BOUND BY THESE CONDITIONS
If you don't like the software posted here, please don't hesitate to let us know and we will unpost it.