for ayush kumar verma

indows serial keys all
Windows 8.1 Professional
GCRJD-8NW9H-F2CDX-CCM8D-9D6T9
Windows 8.1 Professional N
HMCNV-VVBFX-7HMBH-CTY9B-B4FXY
Windows 8.1 Enterprise
MHF9N-XY6XB-WVXMC-BTDCT-MKKG7
Windows 8.1 Enterprise N
TT4HM-HN7YT-62K67-RGRQJ-JFFXW
Windows 8
Windows 8 Professional
NG4HW-VH26C-733KW-K6F98-J8CK4
Windows 8 Professional N
XCVCF-2NXM9-723PB-MHCB7-2RYQQ
Windows 8 Enterprise
32JNW-9KQ84-P47T8-D8GGY-CWCK7
Windows 8 Enterprise N
JMNMF-RHW7P-DMY6X-RF3DR-X2BQT
Windows 7
Windows 7 Professional
FJ82H-XT6CR-J8D7P-XQJJ2-GPDD4
Windows 7 Professional N
MRPKT-YTG23-K7D7T-X2JMM-QY7MG
Windows 7 Enterprise
33PXH-7Y6KF-2VJC9-XBBR8-HVTHH
Windows 7 Enterprise N
YDRBP-3D83W-TY26F-D46B2-XCKRJ
Windows 7 Enterprise E
C29WB-22CC8-VJ326-GHFJW-H9DH4
Windows Server 2012 R2
Windows Server 2012 R2 Server Standard
D2N9P-3P6X9-2R39C-7RTCD-MDVJX
Windows Server 2012 R2 Datacenter
W3GGN-FT8W3-Y4M27-J84CP-Q3VJ9
Windows Server 2012 R2 Essentials
KNC87-3J2TX-XB4WP-VCPJV-M4FWM
Windows Server 2012
Windows Server 2012 Core
BN3D2-R7TKB-3YPBD-8DRP2-27GG4
Windows Server 2012 Core N
8N2M2-HWPGY-7PGT9-HGDD8-GVGGY
Windows Server 2012 Core Single Language
2WN2H-YGCQR-KFX6K-CD6TF-84YXQ
Windows Server 2012 Core Country Specific
4K36P-JN4VD-GDC6V-KDT89-DYFKP
Windows Server 2012 Server Standard
XC9B7-NBPP2-83J2H-RHMBY-92BT4
Windows Server 2012
Standard Core
XC9B7-NBPP2-83J2H-RHMBY-92BT4
Windows Server 2012 Multipoint Standard
HM7DN-YVMH3-46JC3-XYTG7-CYQJJ
Windows Server 2012 Multipoint Premium
XNH6W-2V9GX-RGJ4K-Y8X6F-QGJ2G
Windows Server 2012 Datacenter
48HP8-DN98B-MYWDG-T2DCC-8W83P
Windows Server 2012 Datacenter Core
48HP8-DN98B-MYWDG-T2DCC-8W83P
Windows Server 2008 R2
Windows Server 2008 R2 HPC Edition
FKJQ8-TMCVP-FRMR7-4WR42-3JCD7
Windows Server 2008 R2 Datacenter
74YFP-3QFB3-KQT8W-PMXWJ-7M648
Windows Server 2008 R2 Enterprise
489J6-VHDMP-X63PK-3K798-CPX3Y
Windows Server 2008 R2 for Itanium-Based Systems
GT63C-RJFQ3-4GMB6-BRFB9-CB83V
Windows Server 2008 R2 Standard
YC6KT-GKW9T-YTKYR-T4X34-R7VHC
Windows Web Server 2008 R2
6TPJF-RBVHG-WBW2R-86QPH-6RTM4

0 comments:

how to set up scheduled defrags

Scheduled Tasks - Defrag, how to set up scheduled defrags


oi m8s i figured this out because i ran into problems with trying to get windows task manager to defrag my hardrive at a certain time by only using built in tools.

Step 1

open up notepad (or favorite editor) and type:


defrag c:
defrag d:
defrag e:
defrag f:
defrag g:
defrag j:


make sure to change the drive letters to one that match your system. After you have customized the drive letters save the file as defrag_script.BAT or whatever is easy for you to remeber. Just make sure its a ".BAT" file. I saved the file into a dir in my documents called scripts but you can put it anywhere.

Step 2

Now that you have the script already made open your control panel and click on "Scheduled Tasks".

Select file>new>Scheduled Task

it should create a file on oin the window called "New Task" slect this and right click to properties.

In the run box click browse and navigate to your script. make sure that you run it with an account that has administrator rights otherwise it might not work.

Now select the schedule tab from the top and input the time and how often. I chose to urn it every noght however you could probably run it once a week and still be fine.

After yo uset the time and how often have a look in the settings tab and see if you need to change anything. Then click okay and your done!


you can also modify the script further by adding various operations on the ends of the defrag command:
CODE

-a  Analyze Only
-f Force defragmentation even if free space is low
-v verbose output
-? Display help text


You can also pipe the command defrag to a log file if you want to see what went on the last time the script ran:
CODE

--this form will rewirte the log file erasing any previous info--
defrag x: -v > x:/logs/defrag_log.txt

--this form will append the new info to the end of the old--
defrag x: -v >> x:/logs/defrag_log.txt
this article is taken from internet if it is a copyright of someone please notify me .





0 comments:

window xp tweaks

Services to turn off:
Alerter
Application Management
Automatic Updates
ClipBook
Distributed Link Tracking Client
Error Reporting Service
Fast User Switching Compatibility
Messenger
Portable Media Serial Number Service
Remote Registry
Routing and Remote Access
Task Scheduler
Telnet
TPC/IP NetBIOS Helper
Uninterruptible Power Supply


Change "Recycle Bin" size to 1%


Registry Hacks:

Auto Sort Start Menu
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MenuOrder
Go to Edit/Permissions, click Advanced, clear the "Inherit From Parent" check box, click Copy from the dialog box, click OK and then clear the "Full Control" for your account and now Windows will autp sort the start menu, but you can still do it too

Disable User Tracking
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
Add or Edit DWORD = NoInstrumentation, Value = 1
Disables Windows user tracking; better performance, much better privacy

Cache Thumbnails
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
Add or Edit DWORD = DisableThumbnailCache, Value = 1
Disables thumbnails in Windows, saving hard drive space

Kill Chrashed Apps Quicker
HKEY_CURRENT_USER\Control Panel\Desktop
Add or Edit Sring = HungAppTimeout, Value = 1000-5000
Cuts time for Windows to recongize a crashed application and allow you to kill it; default is 5000(for 5 seconds)

Faster Start Menu
HKEY_CURRENT_USER\Control Panel\Desktop
Add or Edit Sring = MenuShowDelay, Value = 0 - 400
Changes the delay that for Windows to show a menu in the start menu; value is in ms

Network Intelligently
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters
Add or Edit String = DisableTaskOffload, Value = 1
Frees processor from doing network-card work

Browse the Network Faster
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RemoteComputer\NameSpace
Delete subkeys {2227A280-3AEA-1069-A2DE-08002B30309D} and {D6277990-4C6A-11CF-8D87-00AA0060F5BF}
Speeds up network browsing of old Windows machines on the LAN by ignoring their scheduled tasks and printers


Remove Compression Option In Disk Cleanup
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Compress old files
Delete the Default Value Key and the next time you start Disk Cleanup, it will skip the compression analyisis
this article is taken from internet if it is a copyright of someone please notify me .

0 comments:

speed up mozilla firefox

Mozilla Firefox, Speed it up!

Speed up Mozilla FireFox

--------------------------------------------------------------------------------

1. Type "about :config" in the adress field.
2. Set the value of network.http.pipelining to "true".
3. Set the value of network.http.pipelining.maxrequests to "100".
4. Set the value of network.http.proxy.pipelining to "true"
5. Set the value of nglayout.initialpaint.delay to "0" (not availible in newer versions)
this article is taken from internet if it is a copyright of someone please notify me .

0 comments:

anti virus a depth guide

The Antivirus Defense-in-Depth Guide
Overview


View all security guidance topics
Server Security
Desktop Security
On This Page
    Introduction
    Guide Chapter Summary
    Give Us Your Feedback
Introduction

Although many organizations have deployed antivirus software, malicious software such as computer viruses, worms, and Trojan horses continue to infect computer systems around the world. There is no single reason for this apparent contradiction, but the current situation indicates that the standard approach of deploying antivirus software on each computer in your environment may not be sufficient.

The Antivirus Defense-in-Depth Guide provides an easy to understand overview of different types of malware, or malicious software, including information about the risks they pose, malware characteristics, means of replication, and payloads. The guide details considerations for planning and implementing a comprehensive antivirus defense for your organization, and provides information on defense-in-depth planning and related tools that you can use to help reduce your risk of infection. The final chapter of the guide provides a comprehensive methodology to help you quickly and effectively respond to and recover from malware outbreaks or incidents.
Top of page
Guide Chapter Summary

The Antivirus Defense-in-Depth Guide consists of four chapters:
Chapter 1: Introduction

This chapter presents a brief introduction to the guidance, an overview of each chapter, and the intended audience of the guide.
Chapter 2: Malware Threats

This chapter defines the primary types of malware and specifies what types of programs are included — and excluded — in this category. It also provides information about malware characteristics, attack vectors, means of propagation and payloads.
Chapter 3: Antivirus Defense-in-Depth

This chapter details considerations for establishing a comprehensive antivirus defense for your clients, servers, and network infrastructure. It also discusses user policies and general security measures that Microsoft recommends considering when forming your overall security plan.
Chapter 4: Outbreak Control and Recovery

This chapter provides a step-by-step approach to resolving and recovering from malware attacks, based on industry best practices and internal operations at Microsoft.
Top of page
Give Us Your Feedback

We would appreciate any feedback you might have on this guidance. In particular, we would be grateful for any feedback on the following topics:
•   

How useful was the information provided?
•   

Were the step-by-step procedures accurate?
•   

Were the chapters readable and interesting?
•   

Overall, how would you rate the guidance?

Send your feedback to secwish@microsoft.com. We look forward to hearing from you.
this article is taken from internet if it is a copyright of someone please notify me .

0 comments:

how to speed up internet?

 Speed Up Internet

Windows 2k/XP

1. First, open the Windows Registry using Regedit, and (after backing up) navigate to:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\ServiceProvider
2. Note the following lines (all hex dwords):
Class = 008 ( biggrin.gif - indicates that TCP/IP is a name service provider, don't change
LocalPriority = 1f3 (499) - local names cache
HostsPriority = 1f4 (500) - the HOSTS file
DnsPriority = 7d0 (2000) - DNS
NetbtPriority = 7d1 (2001) - NetBT name-resolution, including WINS
3. What we're aiming to do is increase the priority of the last 4 settings, while keeping their order. The valid range is from -32768 to +32767 and lower numbers mean higher priority compared to other services. What we're aiming at is lower numbers without going to extremes, something like what's shown below should work well:
4. Change the "Priority" lines to:
LocalPriority = 005 (5) - local names cache
HostsPriority = 006 (6) - the HOSTS file
DnsPriority = 007 (7) - DNS
NetbtPriority = 008 ( biggrin.gif - NetBT name-resolution, including WINS
5. Reboot for changes to take effect

2. Windows 9x/ME

1. The tweak is essentialy the same as in Windows 2000/XP, just the location in the Registry is slightly different. For a more detailed description see the Windows 2000/XP section above
2. Open the Windows Registry using Regedit, and (after backing up) navigate to:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\VxD\MSTCP\ServiceProvider
3. You should see the following settings:
Class=hex:08,00,00,00

LocalPriority=hex:f3,01,00,00
HostsPriority=hex:f4,01,00,00
DnsPriority=hex:d0,07,00,00
NetbtPriority=hex:d1,07,00,00
4. The "priority" lines should be changed to:
LocalPriority=hex:05,00,00,00
HostsPriority=hex:06,00,00,00
DnsPriority=hex:07,00,00,00
NetbtPriority=hex:08,00,00,00
5. Reboot for changes to take effect

3. System.ini IRQ Tweak - Windows 9x/ME ONLY

1. Find your Network Card's IRQ

1. In order to add the entry to your System.ini file, you'd first have to find your NIC's IRQ
2. Right-click on My Computer icon on your Desktop, then left-click on Properties (a shortcut for that would be to press the 'Windows' + 'Pause' keys). Navigate to Device Manager and double-click on Computer. Under "View Resources" you will find a list of IRQs, each with description of the device that's using it. Note the IRQ number used by your Network Adapter

2. Adding the entry to System.ini

1. Once you've found the IRQ of your Network Card, you need to reserve some RAM for its use, by adding an entry to the System.ini file. You can edit the file in any text editor, however the easiest way is to use Windows' built in "System Configuration Editor"
2. Navigate to Start > Run and type sysedit . Find the [386enh] Section in the System.ini file and add Irq[n]=4096 under it, where [n] is the IRQ number of your NIC and 4096 is the amount of RAM you want to reserve in Kbytes. We recommend using 4096, however you can experiment with different values if you want. Save changes in the file, exit and reboot for changes to take effect.
Note: If you choose to try different values, keep in mind that reserving too much RAM for your NIC will decrease the amount of RAM available for applications, while reserving too little might not give the desired effect

3. Additional Thoughts
1. The only negative effect of the System.ini IRQ tweak is that it will reduce the amount of RAM available for running applications a bit, by reserving some specifically for your Network Card's use. The gain in performance usually outweighs the negative effect by far, considering any Computer with 32Mb of RAM or more
2. This tweak may or may not work for you. It is not a documented tweak by Windows
3. Keep in mind that if you add hardware to your system the IRQ of the Network Adapter might change, in which case you will need to modify the setting in System.ini
4. In systems with multiple NICs, you might want to add the setting for both IRQs. Also, you could reserve RAM for other IRQs if you wish, just use common sense and don't forget it reduces the amount of RAM available for running applications
5. If you are using an USB device, it does not have a specific IRQ, however you can try adding the entry using the IRQ of the USB Controller
6. For internal Cable Modems, you'd have to add the entry using the IRQ of your modem, rather than the IRQ of a Network Card



RESULTS WILL VARY
No matter how good your systems may be, they're only as effective as what you put into them.
this article is taken from internet if it is a copyright of someone please notify me .

0 comments:

how to create a bootable cd?

How to create a bootable Windows XP SP1 CD (Nero):

Step 1

Create 3 folders - C:\WINXPSP1, C:\SP1106 and C:\XPBOOT

Step 2

Copy the entire Windows XP CD into folder C:\WINXPSP1

Step 3

You will have to download the SP1 Update, which is 133MB.
Rename the Service Pack file to XP-SP1.EXE
Extract the Service Pack from the Run Dialog using the command:
C:\XP-SP1.EXE -U -X:C:\SP1106

Step 4

Open Start/Run... and type the command:
C:\SP1106\update\update.exe -s:C:\WINXPSP1

Click OK

Folder C:\WINXPSP1 contains: Windows XP SP1



How to Create a Windows XP SP1 CD Bootable

Step 1

Download xpboot.zip
Code:
Code:
http://thro.port5.com/xpboot.zip

( no download manager !! )

Extract xpboot.zip file (xpboot.bin) in to the folder C:\XPBOOT

Step 2

Start Nero - Burning Rom.
Select File > New... from the menu.
1.) Select CD-ROM (Boot)
2.) Select Image file from Source of boot image data
3.) Set Kind of emulation: to No Emulation
4.) Set Load segment of sectors (hex!): to 07C0
5.) Set Number of loaded sectors: to 4
6.) Press the Browse... button



Step 3

Select All Files (*.*) from File of type:
Locate boot.bin in the folder C:\XPBOOT

Step 4

Click ISO tab
Set File-/Directory length to ISO Level 1 (Max. of 11 = 8 + 3 chars)
Set Format to Mode 1
Set Character Set to ISO 9660
Check all Relax ISO Restrictions




Step 5

Click Label Tab
Select ISO9660 from the drop down box.
Enter the Volume Label as WB2PFRE_EN
Enter the System Identifier as WB2PFRE_EN
Enter the Volume Set as WB2PFRE_EN
Enter the Publisher as MICROSOFT CORPORATION
Enter the Data Preparer as MICROSOFT CORPORATION
Enter the Application as WB2PFRE_EN

* For Windows XP Professional OEM substitute WB2PFRE_EN with WXPOEM_EN
* For Windows XP Home OEM substitute WB2PFRE_EN with WXHOEM_EN

Step 6

Click Burn tab
Check Write
Check Finalize CD (No further writing possible!)
Set Write Method to Disk-At-Once

Press New button

Step 7

Locate the folder C:\WINXPSP1
Select everything in the folder and drag it to the ISO compilation panel.
Click the Write CD Dialog button.

Press Write

You're done.
this article is taken from internet if it is a copyright of someone please notify me .


0 comments:

how to take wattage of computer?

Testing Wattage Consumption Of Your Computer

Measuring your computer's wattage is a good way of knowing if you are overloading your UPS, or if you have too many things plugged in to the same circuit. This article will show you how you can test wattage of your equipment using a multi meter and a few wires.

Visit



http://www.iceteks.com/articles.php?act=view&article=pcwattage&p=1&

--------------------------------------------------------------------------------------------------------------

Testing Wattage consumption of your computer equipment
Making sure you’re not overloading your UPS or misc power source

Did you ever wonder how many watts your equipment is using? Whether it is a PC with monitor, or a whole UD cluster setup with 100's of machines this article will let you know how to easily find out. Or perhaps you just want to know how much power you would need to build one of those clusters. You can estimate yourself since some appliances such as monitors show the rating on the back but some other things such as computer power supplies don't. And just because it's a 300W power supply does not mean it uses 300W of power. It all depends on how much of that power the components are using. Watts are usually the best measurement to know because it does not change. But volts and amps do. If you plug in a vacuum cleaner in an 80volt power source it will be using way more amps then if you plug it in a 120V power source.

Watts is equal to volts times amps. So basically the higher the voltage, the fewer amps being drawed. Amps are also the actual current and what decides on the power of the circuit. What I mean by that is, if there's not enough amps, you can't run much, even if the voltage is high. A static shock can have millions of volts passing through you but yet it's not enough to power a light bulb, because there are very little amps. Amps also cause wires to heat up, the more amps, the bigger wires you need since if they are too small they will melt. This explains why power cords for large equipment are thicker, while a small lamp is just a cheap cord that you can cut with a pair of scissors, since one uses more amps but same voltage, and this results in more watts as well. Because of this heat though, there is power loss, so this is why when power is delivered to far distances, it is sent in high voltages, so they can use smaller cabling (cheaper) and there's less loss of energy from heat. So it's more efficient. But just because of what I said about the static electricity, don't think you can go climb one of those poles and get a shock that tickles.

Enough theory, let's get started.

First this is what you will need:

# A multi meter: One that can measure AC amps and AC voltages and should have a high enough rating. These can be purchased at a Radio Shack or similar store for about $100 and are very useful around the house.
# Crocodile wires or other wires easy to manipulate and plug.
# An old power cord with both ends open to connect the crocodile clips to it easily. (or equivalent, basically any thing that can easly be plugged and unplugged from the socket)
# Calculator (everyone has at least one around the house)
# Safety common sense (this can be hard to find in some households)

Like mentioned earlier, Watts = Volts X Amps. So we need to know how much volts we are giving to the equipment, we know it's near 120 because that's the normal house voltage. But we want to be more exact, so set your meter to measure volts AC and

put both ends in a socket that is on the same circuit as the equipment. For safety purposes, try to find a socket that is easy to access and has plenty of room to move quickly in case something happens. But if you have everything set correctly and don't short it out somehow, you're safe. Just make sure it's set to Volts AC and if your meter has different ranges, set the right range so you don't overload it. But most good meters will auto sense the range for you.



Because my plug has too many wires near it at the PC, for this picture I'm measuring a different circuit but if your house is wired like mine there should only be 2 main circuits (two separate AC phases) so they should both be near anyway. I get the same reading here and in my room.

The voltage tends to move a bit. In my case it was around 119 and 121 so let's just say 120.

page 2:


Testing Wattage consumption of your computer equipment
Making sure you’re not overloading your UPS or misc power source

Measuring amps is a bit trickier especially with mains power since you don't just shove it anywhere, but you have to break the circuit and put the amp meter in it, and be safe. So the easiest way to do this is by wiring the circuit yourself with the crocodile clips.

So turn off and unplug the device you want to test, in this case a monitor. Connect everything like shown in this picture. The arrows indicate the flow of electricity to make it easier to follow the circuit with all these wires all over. Note that this flow of electricity changes 60 times a second (50 times in some regions, the UK I believe) so this is why AC is different than DC.



So the white wire is plugged into the mains, and the black is the plug for the monitor. Completely ignore the ground for testing, DO NOT PLUG ANYTHING TO IT! In a permanent setup you would want to ground it, but for testing purposes it's ok to have it ungrounded for a bit, just be careful and if you feel safer ground a crocodile clip and connected to the grounding pin, but be careful since there's more chance of a wire slipping and shorting out. In the picture it's hard to see but the two wires connect to the two pins of the plug, so think of the two pins as the + and - of a device that needs power and the two wires as the + and - of a power source, since this is what it is, but with AC so the + and - order does not matter, but make sure the two wires don't contact each other since that's a short and you can blow the meter.

On the amp meter, the terminals used are the unfused 10A max and the COM. The fuse in the meter has a max of 500mA so it's best not to take a chance at blowing it, when we're measuring this much amps, and chances are you won't measure anything more then 10Amps. Never measure an entire power strip, but each item individually, to make sure of this.

When setting up the wires, make extra sure to unplug the cable that is feeding the power (the white one in this case) Once completed let part of the circuit broken like in thes picture below, plug in the cable then take both wires (the red crocodile clip and black meter cable in this case) and tick them together quickly just to be sure you won't cause some kind of short. Again, this is only to make sure you did not mess anything up such as badly setting the meter, or if some wires are touching somewhere that should not. Then hook them up together solidly and turn on the device you are measuring and you will get a reading. Lot of equipment have transformers and stuff which use up a bit of amps even when turned off, so this is why you will sometimes get a reading even when it's turned off. If you calculate all the devices in your house like this, you may be using a few amps from items just sitting there turned off!

The following pic shows the circuit unplugged and ready to go.



Take note of the reading and repeat this process for each item. So when done you should have something like this:

House voltage: 120V
PC full load: 1.2A
PC without fans, lights and UD: 0.8A
Monitor: 0.5A

Once you have all the readings, just do Volts times Amps. So...

120V X 1.2A = 144W
120V X 0.8A = 96W
120V X 0.5A = 63W

Since the first 2 readings are the same device you can decide on if you just want the average, or the most widely used. In my case I put the most widely used, since it's very rare that I turn off UD (0.2Amps) or the lights. Sometimes I may turn off a set of fans but those don't make a big difference. So I'll stick with 144W.

So now we simply add 144 + 63 which gives us 207 Watts. So now I know that my PC and monitor which are plugged into my UPS use up about 207Watts.

Also note that this is only the base of the concept and because this is AC and not DC, it get's more complicated. Amps are sometimes not in sync with the volts and unless you are using a RMS (root means square) meter, you may get inaccurate results. Some meters don't even tell you if they are RMS or not, so I'm not even sure if the one I used is or not but according to what some say these readings seem about right for the equipment used. Basically, try to not go too near your UPSes max wattage and you should be safe. Some UPSes also don't even tell you how many watts it can handle, but rather VA (volt amps) which are slightly different.

    Danger: The activities in this tutorial were done since I knew what I was doing and was using proper safety measures to avoid accidents. Please realize that this activity, especially with amp readings over 1 can be fatal! Be extremely careful, especially not to close any open circuits with your body as it will make the amps go through you, and possibly kill you! If you have any heart problems, this is even a bigger risk to take and should most likely be done by someone else.

Disclaimer: IceTeks, or myself may not be held responsible for any damage done during the proceeding of this article. This is for informational purposes only and should only be performed by someone who knows what they are doing!
this article is taken from internet if it is a copyright of someone please notify me .


0 comments:

how to take wattage of anything?

Did you ever wonder how many watts your equipment is using? Whether it is a PC with monitor, or a whole UD cluster setup with 100's of machines this article will let you know how to easily find out. Or perhaps you just want to know how much power you would need to build one of those clusters. You can estimate yourself since some appliances such as monitors show the rating on the back but some other things such as computer power supplies don't. And just because it's a 300W power supply does not mean it uses 300W of power. It all depends on how much of that power the components are using. Watts are usually the best measurement to know because it does not change. But volts and amps do. If you plug in a vacuum cleaner in an 80volt power source it will be using way more amps then if you plug it in a 120V power source.

Watts is equal to volts times amps. So basically the higher the voltage, the fewer amps being drawed. Amps are also the actual current and what decides on the power of the circuit. What I mean by that is, if there's not enough amps, you can't run much, even if the voltage is high. A static shock can have millions of volts passing through you but yet it's not enough to power a light bulb, because there are very little amps. Amps also cause wires to heat up, the more amps, the bigger wires you need since if they are too small they will melt. This explains why power cords for large equipment are thicker, while a small lamp is just a cheap cord that you can cut with a pair of scissors, since one uses more amps but same voltage, and this results in more watts as well. Because of this heat though, there is power loss, so this is why when power is delivered to far distances, it is sent in high voltages, so they can use smaller cabling (cheaper) and there's less loss of energy from heat. So it's more efficient. But just because of what I said about the static electricity, don't think you can go climb one of those poles and get a shock that tickles.

Enough theory, let's get started.

First this is what you will need:


  • A multi meter: One that can measure AC amps and AC voltages and should have a high enough rating. These can be purchased at a Radio Shack or similar store for about $100 and are very useful around the house.
  • Crocodile wires or other wires easy to manipulate and plug.
  • An old power cord with both ends open to connect the crocodile clips to it easily. (or equivalent, basically any thing that can easly be plugged and unplugged from the socket)
  • Calculator (everyone has at least one around the house)
  • Safety common sense (this can be hard to find in some households)

    Like mentioned earlier, Watts = Volts X Amps. So we need to know how much volts we are giving to the equipment, we know it's near 120 because that's the normal house voltage. But we want to be more exact, so set your meter to measure volts AC and

    put both ends in a socket that is on the same circuit as the equipment. For safety purposes, try to find a socket that is easy to access and has plenty of room to move quickly in case something happens. But if you have everything set correctly and don't short it out somehow, you're safe. Just make sure it's set to Volts AC and if your meter has different ranges, set the right range so you don't overload it. But most good meters will auto sense the range for you.

    shoving things in the mains is fun!


    Because my plug has too many wires near it at the PC, for this picture I'm measuring a different circuit but if your house is wired like mine there should only be 2 main circuits (two separate AC phases) so they should both be near anyway. I get the same reading here and in my room.

    The voltage tends to move a bit. In my case it was around 119 and 121 so let's just say 120. 
  • this article is copied from icetecks.com
  •  

  • 0 comments:

    how safely edit your registry?

     Windows XP has a vast number of configuration dialogs, but some adjustments can be performed only by directly editing the Registry. Frequently, tips involving Registry tweaks include stern warnings to back up the Registry before making any change. The Windows XP Backup applet can back up the Registry along with other elements of the System State, but the resulting data file can occupy hundreds of megabytes. You're better off saving a system restore point each time you're about to edit the Registry. Better still, you can use Regedit to back up only the Registry keys that will be changed.

    Click on Start | Run and enter Regedit to launch the Registry editor. To back up an individual key you plan to edit, navigate to the key and right-click on it. Choose Export from the menu, and save the key to a REG file. Open the REG file in Notepad and insert a few comment lines that describe the source and purpose of the tweak. (To create a comment line, simply put a semicolon at the start of the line.)

    Now go ahead and make all the changes to Registry keys and values specified by the tip you're applying. Any time you add a new key or value, make a note of it with another comment line in the REG file. When you're done, save the REG file and close Notepad.


    If later you want to undo this Registry tweak, just double-click on the REG file and confirm that you want to add it to the Registry. This will restore any deleted keys or values and will restore the original data for any values whose data was changed. Note that this will not remove new keys or values that were added; that's why you need to make comments about such changes.

    Right-click on the REG file and choose Edit, which will open it in Notepad. Check for comments about keys or values that were added, and if you find any, use Regedit to delete them. You can delete the REG file itself once you've completed this process

    this article is taken from internet if it is a copyright of someone please notify me .

    0 comments:

    some trojan ports

     TCP 1 Breach.2001, SocketsDeTroie.230, SocketsDeTroie.250
    TCP 28 Amanda.200
    TCP 31 MastersParadise.920
    TCP 68 Subseven.100
    TCP 142 NetTaxi.180
    TCP 146 Infector.141, Intruder.100, Intruder.100
    TCP 171 ATrojan.200
    TCP 285 WCTrojan.100
    TCP 286 WCTrojan.100
    TCP 334 Backage.310
    TCP 370 NeuroticKat.120, NeuroticKat.130
    TCP 413 Coma.109
    TCP 420 Breach.450
    TCP 555 Id2001.100, PhaseZero.100, StealthSpy.100
    TCP 623 Rtb666.160
    TCP 660 Zaratustra.100
    TCP 661 Noknok.800, Noknok.820
    TCP 666 BackConstruction.210, BackConstruction.250, Bla.100, Bla.200, Bla.400, Bla.503, Cain.150, Dimbus.100, Noknok.820, Ripper.100, SatansBackdoor.100, SatansBackdoor.101, SatansBackdoor.102, Unicorn.100, Unicorn.101, Unicorn.110
    TCP 667 SniperNet.210, Snipernet.220
    TCP 668 Unicorn.101, Unicorn.110
    TCP 680 Rtb666.160
    TCP 777 Tiny.100, Undetected.230, Undetected.300, Undetected.310, Undetected.320, Undetected.330, Undetected.331, Undetected.332
    TCP 785 NetworkTerrorist.100
    TCP 800 NeuroticKitten.010
    TCP 831 NeuroticKat.100, NeuroticKat.120, NeuroticKat.130
    TCP 901 NetDevil.130, NetDevil.140
    TCP 1000 DerSpaeher.200
    TCP 1001 Silencer.100
    TCP 1008 AutoSpy.100
    TCP 1010 DerSpaeher.200
    TCP 1015 Doly.150
    TCP 1111 TPort.100
    TCP 1130 Noknok.800, Noknok.820
    TCP 1207 SoftWAR.100
    TCP 1243 Subseven.100, SubSeven.110, SubSeven.180, SubSeven.190, Subseven.200
    TCP 1245 VoodooDoll.006
    TCP 1269 Matrix.130
    TCP 1480 RemoteHack.130
    TCP 1568 RemoteHack.100, RemoteHack.110
    TCP 1600 DirectConnection.100
    TCP 1601 DirectConnection.100
    TCP 1602 DirectConnection.100
    TCP 1634 NetCrack.100
    TCP 1784 Snid.120, Snid.212
    TCP 1999 TransmissionScout.100, TransmissionScout.110
    TCP 2000 ATrojan.200, InsaneNetwork.400
    TCP 2001 DIRT.220, TrojanCow.100
    TCP 2003 TransmissionScout.100, TransmissionScout.110
    TCP 2023 RipperPro.100
    TCP 2040 InfernoUploader.100
    TCP 2115 Bugs.100
    TCP 2140 DeepThroat.100, DeepThroat.200, DeepThroat.310
    TCP 2332 SilentSpy.202
    TCP 2589 Dagger.140
    TCP 2600 DigitalRootbeer.100
    TCP 2989 Rat.200
    TCP 3128 MastersParadise.970
    TCP 3129 MastersParadise.920, MastersParadise.970
    TCP 3150 DeepThroat.100, DeepThroat.200, DeepThroat.310, MiniBacklash.110
    TCP 3215 BlackStar.100, Ghost.230
    TCP 3333 Daodan.123
    TCP 3410 OptixPro.100, OptixPro.110
    TCP 3456 Force.155, TerrorTrojan.100
    TCP 3505 AutoSpy.130, AutoSpy.140
    TCP 3586 Snid.120, Snid.212
    TCP 3700 PortalOfDoom.100
    TCP 3723 Mantis.100
    TCP 3800 Eclypse.100
    TCP 3996 RemoteAnything.364
    TCP 4000 SkyDance.220, SkyDance.229
    TCP 4201 Wartrojan.160, Wartrojan.200
    TCP 4225 SilentSpy.202
    TCP 4321 Bobo.100
    TCP 4444 AlexTrojan.200, Crackdown.100
    TCP 4488 EventHorizon.100
    TCP 4523 Celine.100
    TCP 4545 InternalRevise.100, RemoteRevise.150
    TCP 4567 FileNail.100
    TCP 4666 Mneah.100
    TCP 4950 ICQTrojan.100
    TCP 5005 Aladino.060
    TCP 5025 Keylogger.WMRemote.100
    TCP 5031 NetMetro.104
    TCP 5032 NetMetro.104
    TCP 5033 NetMetro.104
    TCP 5050 RoxRat.100
    TCP 5151 OptixLite.020, OptixLite.030, OptixLite.040
    TCP 5190 MBomber.100
    TCP 5277 WinShell.400
    TCP 5343 WCRat.100
    TCP 5400 BackConstruction.120, BackConstruction.150, BladeRunner.080, DeepThroat.300
    TCP 5401 BackConstruction.120, BackConstruction.150, BackConstruction.210, BackConstruction.250, BladeRunner.080, DeepThroat.300, Mneah.100
    TCP 5402 BackConstruction.210, BackConstruction.250, BladeRunner.080, DeepThroat.300, Mneah.100
    TCP 5534 TheFlu.100
    TCP 5550 XTCP.200, XTCP.201
    TCP 5555 Noxcape.100, Noxcape.200
    TCP 5695 Assassin.100
    TCP 5714 WinCrash.100
    TCP 5741 WinCrash.100
    TCP 5742 WinCrash.103
    TCP 5802 Y3KRat.160
    TCP 5810 Y3KRat.160
    TCP 5838 Y3KRat.170
    TCP 5858 Y3KRat.110, Y3KRat.120, Y3KRat.140
    TCP 5880 Y3KRat.140
    TCP 5881 Y3KRat.110, Y3KRat.120, Y3KRat.140
    TCP 5882 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.140, Y3KRat.150
    TCP 5883 Y3KRat.110, Y3KRat.140
    TCP 5884 Y3KRat.140, Y3KRat.150
    TCP 5885 Y3KRat.110, Y3KRat.120, Y3KRat.140
    TCP 5886 Y3KRat.120, Y3KRat.140
    TCP 5887 Y3KRat.110, Y3KRat.120, Y3KRat.140
    TCP 5888 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.140, Y3KRat.150
    TCP 5889 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.140, Y3KRat.150
    TCP 5890 Y3KRat.140
    TCP 6400 Thething.100, Thething.150
    TCP 6556 AutoSpy.120, AutoSpy.122
    TCP 6655 Aqua.020
    TCP 6660 LameSpy.095
    TCP 6666 LameRemote.100, ProjectMayhem.100
    TCP 6669 Vampire.100
    TCP 6670 DeepThroat.200, DeepThroat.210
    TCP 6671 DeepThroat.310
    TCP 6699 HostControl.101
    TCP 6711 DeepThroat.300, Noknok.820, SubSeven.180, SubSeven.190
    TCP 6712 Subseven.100
    TCP 6713 Subseven.100
    TCP 6767 NTRC.120
    TCP 6776 SubSeven.180, SubSeven.190, Subseven.200
    TCP 6789 Doly.200
    TCP 6796 SubSeven.214
    TCP 6912 ShitHeep.100
    TCP 6939 Indoctrination.100
    TCP 6953 Lithium.100
    TCP 6969 2000Cracks.100, Bigorna.100, Danton.110, Danton.210, Danton.220, Danton.310, Danton.320, Danton.330, GateCrasher.110, NetController.108, Sparta.110, VagrNocker.120
    TCP 6970 Danton.330
    TCP 7001 Freak88.100
    TCP 7119 Massaker.100
    TCP 7200 Massaker.110
    TCP 7300 Coced.221
    TCP 7301 Coced.221
    TCP 7306 NetSpy.200, NetSpy.200
    TCP 7410 Phoenix.190, Phoenix.200
    TCP 7511 Genue.100
    TCP 7609 Snid.120, Snid.212
    TCP 7614 Wollf.130
    TCP 7648 BlackStar.100, Ghost.230
    TCP 7788 Last.2000, Matrix.200
    TCP 7826 MiniOblivion.010, Oblivion.010
    TCP 7887 SmallFun.110
    TCP 7891 Revenger.100
    TCP 7979 VagrNocker.200
    TCP 7997 VagrNocker.200
    TCP 8000 XConsole.100
    TCP 8011 Way.240
    TCP 8012 Ptakks.215, Ptakks.217
    TCP 8110 LoseLove.100
    TCP 8111 LoseLove.100
    TCP 8301 LoseLove.100
    TCP 8302 LoseLove.100
    TCP 8372 NetBoy.100
    TCP 8720 Connection.130
    TCP 8734 AutoSpy.110
    TCP 8811 Force.155
    TCP 8899 Last.2000
    TCP 9000 Aristotles.100
    TCP 9301 LoseLove.100
    TCP 9400 InCommand.100, InCommand.110, InCommand.120, InCommand.130, InCommand.140, InCommand.150, InCommand.153, InCommand.160, InCommand.167, InCommand.170
    TCP 9401 InCommand.100, InCommand.110, InCommand.170
    TCP 9402 InCommand.100, InCommand.110
    TCP 9561 CRatPro.110
    TCP 9563 CRatPro.110
    TCP 9580 TheefLE.100
    TCP 9696 Danton.210, Ghost.230
    TCP 9697 Danton.320, Danton.330, Ghost.230
    TCP 9870 R3C.100
    TCP 9872 PortalOfDoom.100
    TCP 9873 PortalOfDoom.100
    TCP 9874 PortalOfDoom.100
    TCP 9875 PortalOfDoom.100
    TCP 9876 Rux.100, SheepGoat.100
    TCP 9877 SmallBigBrother.020
    TCP 9878 SmallBigBrother.020, TransmissionScout.100, TransmissionScout.110, TransmissionScout.120
    TCP 9879 SmallBigBrother.020
    TCP 9999 ForcedEntry.100, Infra.100, Prayer.120, Prayer.130, TakeOver.200, TakeOver.300
    TCP 10001 DTr.130, DTr.140
    TCP 10013 Amanda.200
    TCP 10067 PortalOfDoom.100
    TCP 10100 Gift.240
    TCP 10101 NewSilencer.100
    TCP 10167 PortalOfDoom.100
    TCP 10528 HostControl.100, HostControl.260
    TCP 10607 Coma.109
    TCP 10666 Ambush.100
    TCP 11011 Amanda.200
    TCP 11050 HostControl.101
    TCP 11051 HostControl.100, HostControl.260
    TCP 11223 AntiNuke.100, Progenic.100, Progenic.110
    TCP 11225 Cyn.100, Cyn.103, Cyn.120
    TCP 11306 Noknok.800, Noknok.820
    TCP 11831 Katux.200, Latinus.140, Latinus.150, Pest.100, Pest.400
    TCP 11991 PitfallSurprise.100
    TCP 12043 Frenzy.2000
    TCP 12345 Fade.100, Netbus.160, Netbus.170, VagrNocker.400
    TCP 12346 Netbus.160, Netbus.170
    TCP 12348 Bionet.210, Bionet.261, Bionet.280, Bionet.302, Bionet.305, Bionet.311, Bionet.313, Bionet.316, Bionet.317
    TCP 12349 Bionet.084, Bionet.261, Bionet.280, Bionet.302, Bionet.305, Bionet.311, Bionet.313, Bionet.314, Bionet.316, Bionet.317, Bionet.401, Bionet.402
    TCP 12389 KheSanh.210
    TCP 12478 Bionet.210
    TCP 12623 Buttman.090, Buttman.100
    TCP 12624 Buttman.090, Buttman.100
    TCP 12625 Buttman.100
    TCP 12904 Akropolis.100, Rocks.100
    TCP 13473 Chupacabra.100
    TCP 13753 AFTP.010
    TCP 14100 Eurosol.100
    TCP 14194 CyberSpy.840
    TCP 14286 HellDriver.100
    TCP 14500 PCInvader.050, PCInvader.060, PCInvader.070
    TCP 14501 PCInvader.060, PCInvader.070
    TCP 14502 PCInvader.050, PCInvader.060, PCInvader.070
    TCP 14503 PCInvader.050, PCInvader.060, PCInvader.070
    TCP 14504 PCInvader.050, PCInvader.060
    TCP 15092 HostControl.100, HostControl.260
    TCP 15382 SubZero.100
    TCP 15432 Cyn.210
    TCP 15555 ICMIBC.100
    TCP 16322 LastDoor.100
    TCP 16484 MoSucker.110
    TCP 16661 Dfch.010
    TCP 16969 Progenic.100
    TCP 16982 AcidShiver.100
    TCP 17300 Kuang.200
    TCP 17499 CrazzyNet.370, CrazzyNet.375, CrazzyNet.521
    TCP 17500 CrazzyNet.370, CrazzyNet.375, CrazzyNet.521
    TCP 17569 Infector.141, Infector.160, Infector.170, Infector.180, Infector.190, Infector.200, Intruder.100, Intruder.100
    TCP 17593 AudioDoor.120
    TCP 19191 BlueFire.035, BlueFire.041
    TCP 19604 Metal.270
    TCP 19605 Metal.270
    TCP 19991 Dfch.010
    TCP 20000 Millenium.100
    TCP 20001 Millenium.100, PshychoFiles.180
    TCP 20002 AcidKor.100, PshychoFiles.180
    TCP 20005 MoSucker.200, MoSucker.210, MoSucker.220
    TCP 21212 Schwindler.182
    TCP 21554 Exploiter.100, Exploiter.110, Girlfriend.130, GirlFriend.135
    TCP 21579 Breach.2001
    TCP 21584 Breach.2001
    TCP 21684 Intruse.134
    TCP 22068 AcidShiver.110
    TCP 22115 Cyn.120
    TCP 22222 Prosiak.047, Ruler.141, Rux.300, Rux.400, Rux.500, Rux.600
    TCP 22223 Rux.400, Rux.500, Rux.600
    TCP 22456 Bla.200, Bla.503
    TCP 22457 AcidShiver.120, Bla.200, Bla.503
    TCP 22784 Intruzzo.110
    TCP 22845 Breach.450
    TCP 22847 Breach.450
    TCP 23005 Infinaeon.110, NetTrash.100, Oxon.110, WinRat.100
    TCP 23006 Infinaeon.110, NetTrash.100, Oxon.110, WinRat.100
    TCP 23032 Amanda.200
    TCP 23432 Asylum.010, Asylum.012, Asylum.013, Asylum.014, MiniAsylum.110
    TCP 23456 EvilFTP.100, VagrNocker.400
    TCP 23476 DonaldDick.153, DonaldDick.154, DonaldDick.155
    TCP 23477 DonaldDick.153
    TCP 24000 Infector.170
    TCP 24307 Wildek.020
    TCP 25386 MoonPie.220
    TCP 25486 MoonPie.220
    TCP 25555 FreddyK.100, FreddyK.200
    TCP 25556 FreddyK.100
    TCP 25685 MoonPie.010, MoonPie.012, MoonPie.130, MoonPie.220, MoonPie.240, MoonPie.400
    TCP 25686 MoonPie.135, MoonPie.200, MoonPie.400
    TCP 25982 MoonPie.135, MoonPie.200
    TCP 26274 Delta.050
    TCP 27160 MoonPie.135, MoonPie.200
    TCP 27184 Alvgus.100, Alvgus.800
    TCP 27374 Muerte.110, Subseven.210, SubSeven.213
    TCP 28429 Hack'a'Tack.2000
    TCP 28430 Hack'a'Tack.2000
    TCP 28431 Hack'a'Tack.2000
    TCP 28432 Hack'a'Tack.2000
    TCP 28433 Hack'a'Tack.2000
    TCP 28434 Hack'a'Tack.2000
    TCP 28435 Hack'a'Tack.2000
    TCP 28436 Hack'a'Tack.2000
    TCP 29559 DuckToy.100, DuckToy.101, Katux.200, Latinus.140, Latinus.150, Pest.100, Pest.400
    TCP 29891 Unexplained.100
    TCP 30000 Infector.170
    TCP 30001 Error32.100
    TCP 30003 LamersDeath.100
    TCP 30029 AOLTrojan.110
    TCP 30100 NetSphere.127, NetSphere.130, NetSphere.131
    TCP 30101 NetSphere.127, NetSphere.130, NetSphere.131
    TCP 30102 NetSphere.127, NetSphere.130, NetSphere.131
    TCP 30103 NetSphere.131
    TCP 30947 Intruse.134
    TCP 31320 LittleWitch.400, LittleWitch.420
    TCP 31337 BackOrifice.120, Khaled.100, OPC.200
    TCP 31415 Lithium.101
    TCP 31416 Lithium.100, Lithium.101
    TCP 31557 Xanadu.110
    TCP 31631 CleptoManicos.100
    TCP 31745 Buschtrommel.100, Buschtrommel.122
    TCP 31785 Hack'a'Tack.100, Hack'a'Tack.112
    TCP 31787 Hack'a'Tack.100, Hack'a'Tack.112
    TCP 31789 Hack'a'Tack.100, Hack'a'Tack.112
    TCP 31791 Hack'a'Tack.100, Hack'a'Tack.112
    TCP 31887 BDDT.100
    TCP 31889 BDDT.100
    TCP 32100 ProjectNext.053
    TCP 32418 AcidBattery.100
    TCP 32791 Akropolis.100, Rocks.100
    TCP 33291 RemoteHak.001
    TCP 33333 Blackharaz.100, Prosiak.047, SubSeven.214
    TCP 33577 SonOfPsychward.020
    TCP 34324 TelnetServer.100
    TCP 34763 Infector.180, Infector.190, Infector.200
    TCP 35000 Infector.190, Infector.200
    TCP 35600 Subsari.140
    TCP 36794 BugBear.100
    TCP 37237 Mantis.020
    TCP 37651 YAT.210
    TCP 37653 YAT.310
    TCP 40308 Subsari.140
    TCP 40412 TheSpy.100
    TCP 40421 MastersParadise.970
    TCP 40422 MastersParadise.970
    TCP 40999 DiemsMutter.110, DiemsMutter.140
    TCP 41626 Shah.100
    TCP 44444 Prosiak.070
    TCP 45673 Akropolis.100, Rocks.100
    TCP 47262 Delta.050
    TCP 48006 Fragglerock.200
    TCP 49683 HolzPferd.210
    TCP 50000 Infector.180
    TCP 50130 Enterprise.100
    TCP 50766 Fore.100
    TCP 51234 Cyn.210
    TCP 51966 Cafeini.080, Cafeini.110
    TCP 54321 PCInvader.010
    TCP 57341 NetRaider.100
    TCP 57922 Bionet.084
    TCP 58008 Tron.100
    TCP 58009 Tron.100
    TCP 59090 AcidReign.200
    TCP 59211 DuckToy.100, DuckToy.101
    TCP 59345 NewFuture.100
    TCP 60000 DeepThroat.300, MiniBacklash.100, MiniBacklash.101, MiniBacklash.101
    TCP 60411 Connection.100, Connection.130
    TCP 60412 Connection.130
    TCP 60552 RoxRat.100
    TCP 63536 InsaneNetwork.500
    TCP 63878 AphexFTP.100
    TCP 63879 AphexFTP.100
    TCP 64969 Lithium.100
    TCP 65000 Socket.100
    UDP 1 SocketsDeTroie.250
    UDP 666 Bla.200, Bla.400, Bla.503, Noknok.820
    UDP 1130 Noknok.800, Noknok.820
    UDP 2140 DeepThroat.100, DeepThroat.200, DeepThroat.310
    UDP 2989 Rat.200
    UDP 3128 MastersParadise.970
    UDP 3129 MastersParadise.920, MastersParadise.970
    UDP 3150 DeepThroat.100, DeepThroat.200, DeepThroat.310, MiniBacklash.110
    UDP 3333 Daodan.123
    UDP 3800 Eclypse.100
    UDP 3996 RemoteAnything.364
    UDP 4000 RemoteAnything.364
    UDP 5555 Daodan.123
    UDP 5881 Y3KRat.110, Y3KRat.140
    UDP 5882 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.140, Y3KRat.150
    UDP 5883 Y3KRat.110, Y3KRat.140
    UDP 5884 Y3KRat.140, Y3KRat.150
    UDP 5885 Y3KRat.110, Y3KRat.120, Y3KRat.140
    UDP 5886 Y3KRat.120, Y3KRat.140
    UDP 5887 Y3KRat.110, Y3KRat.120, Y3KRat.140
    UDP 5888 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.150
    UDP 6953 Lithium.100
    UDP 8012 Ptakks.217
    UDP 10067 PortalOfDoom.100
    UDP 10167 PortalOfDoom.100
    UDP 10666 Ambush.100
    UDP 11225 Cyn.100, Cyn.103, Cyn.120
    UDP 11306 Noknok.800, Noknok.820
    UDP 12389 KheSanh.210
    UDP 12623 Buttman.090, Buttman.100
    UDP 12625 Buttman.100
    UDP 14100 Eurosol.100
    UDP 23476 DonaldDick.155
    UDP 26274 Delta.050
    UDP 27184 Alvgus.100
    UDP 28431 Hack'a'Tack.2000
    UDP 28432 Hack'a'Tack.2000
    UDP 28433 Hack'a'Tack.2000
    UDP 28434 Hack'a'Tack.2000
    UDP 28435 Hack'a'Tack.2000
    UDP 28436 Hack'a'Tack.2000
    UDP 29891 Unexplained.100
    UDP 30103 NetSphere.131
    UDP 31320 LittleWitch.400, LittleWitch.420
    UDP 31337 BackOrifice.120, OPC.200
    UDP 31416 Lithium.100, Lithium.101
    UDP 31789 Hack'a'Tack.100, Hack'a'Tack.112
    UDP 31791 Hack'a'Tack.100, Hack'a'Tack.112
    UDP 33333 Blackharaz.100
    UDP 47262 Delta.050
    UDP 49683 HolzPferd.210
    UDP 60000 MiniBacklash.100
    this article is taken from internet if it is a copyright of someone please notify me .



    0 comments:

    You Want Lots Of Music, Appz, Anything?

    You Want Lots Of Music, Appz, Anything?, Try Dex Hunting

    So what's this Dex Hunting, anyway?

    See: lots of people post files of any kind on their websites to share them with friends. Those files are "protected" by not mentioning them. There's no visible link given, and for literally hundreds of thousands this seems to be enough.

    What they don't know: There are many nice techniques to locate the invisible stuff.

    I don't want to get in too deep - and as I'm rather new here it's possible some of the tricks might have been posted elsewhere.

    But if you want to find lots of music the way I described it - and want other people doing the "dirty" work I recommend:

    STAIRWAY TO HEAVEN
    A free message board - gathering place of the best "dex hunters" in the universe. There you will find loads of *fresh* (!) mp3 links. Not only this - they update with lightspeed. This is a site you won't visit once a month or once a week. I visit them hourly, and I know why.
    CODE
    http://www.fionasforum.com/Stairway/


    Remember: as soon as a fresh dex is posted there, it will be invaded and can die within hours. But I swear there will be enough left for your needs.

    Curious?
    Wanna try it for yourself?

    Try this one. It's a search bot, and instead typing complicated data strings for Dex Hunting just type what you're looking for, and the bot does the rest for you. Sounds nice, huh?

    http://www.exploseek.com

    not very sexy at first sight - but very effective.

    Hope you'll like it!
    this article is taken from internet if it is a copyright of someone please notify me .

    0 comments:

    slow logon time {fixed}

    My problem was a 1 min login delay due the aktiveds.dll that loads at startup (thanks to NicTech Networks Inc.). The following advice worked for me so I guess it works for any .dll made by NicTech since they all use the same registry folder....

    Open up regedit.exe and find THIS folder. Navigate to it by clicking the +'s to expand
    things like you would in Windows explorer:

    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\Guardian


    Right click over "Guardian" in the left pane.
    Left click on "Permissions"
    Left click "SYSTEM" once to highlight it.
    Check "deny" in all boxes that you can at the bottom (Probably only 2)
    Left click Apply
    Left Click OK

    Say "OK" to any warnings about permissions
    **Reboot** the system

    then problems solved

    I got this information from another forum. I had this problem for about six weeks and was just about ready to reformat my hard drive. Worked great for me, hope this helps out somebody else.
    this article is taken from internet if it is a copyright of someone please notify me .

    0 comments:

    remove banners from free webhost

     Removing Banners From Free Webhosts

    Today,there r number of wesites,which offer you webspace and areasonable good URL,for free.This service has become most popularas it is the easiest and fastest way of puting up ur site on net,getting an identity for ur self and becoming a part of huge web.
    But The problem is they put Huge banners In that free sevice .

    How To remove that?
    its easy
    follow the steps down
    The banners Which r embedded r just about the only source of income for these websites,so if u r caught carrying out any of the below 'No Banner'
    tricks,then u would possible lose ur account. So BEWARE!!!


    For Geocities,,angel fire,freeservers,50 megs,fortune city,netscape

    place the below code after the end HTML tag:
    <noscript></noscript>
    Anglefire/FreeServers/50Megs/FortuneCity/Netscape/tripod
    Place the below code any where on the page:
    <script language="javascript">
    function open() { }
    </script>

    the above snippet will give an error and normally no other Java script code would be executed,so no banner would be displayed.however ,it doesn't work in all cases ,so there is yet another Hack for angelfire:Surround the BODY tag with the below code

    <noscript></noscript>

    If in case any thing doesn't work I am not responsible

    if u want for any other free webhost i will give req here

    ----------------------------------------------------


    Here are some more for you guys, good luck and have fun


    Banner Kills

    Tripod Insert between the <head> tag


    <noscript><noscript><noscript><noscript> </noscript></noscript></noscript></noscript>

    Angelfire Insert anywhere in the <head> tag (for pop-up option)
    <script language="JavaScript">
    <!--
    function open () {return true;}
    //-->
    </script>


    BizLand Insert anywhere in the <head> tag
    <noscript>
    <!--UsePopUpAdBanner-->

    DigiWeb Insert anywhere
    <script language="javascript">
    var winname1="adw";
    var winname2="indow";
    var windowname=winname1+winname2;
    popBusters = window.open("http://popbusters.cjb.net/sponsor/", windowname, "toolbar=no, location=no, directories=no, menubar=no, scrollbar=no, resizable=no, status=no, width=1, height=1")
    popBusters.close()
    </script>


    DomainDLX Insert after the </html> tag
    <noscript>

    EasySpace Insert after the </html> tag
    <noscript>

    Geocities Add this after the </html>
    <noscript>
    <!-- <BODY> -->
    </noscript>

    Namezero Insert in the <head> tag
    <script language="Javascript">
    <!---
    if (parent.frames.length)
    parent.location.href= self.location;
    // --->
    </script>


    Virtual AveInsert after the </html> tag
    <script language="JavaScript">
    <!-- -->
    </noscript>
    </script>


    50Megs.com Insert below <head> an below <title>
    <noscript>
    <!-- <BODY> -->
    </noscript>
    this article is taken from internet if it is a copyright of someone please notify me .


    0 comments:

    1. Start, Run, 'Regedit'.
    2. Press 'Ctrl'+'F' to open find box and type 'Recycle Bin' to search.
    3. Change any value data with 'Recycle Bin' to whatever name you want to give it ( ie, like 'Trash Can' or 'Dump' etc).
    4. Press F3 to continue searching for 'Recycle Bin' and change wherever you come across 'Recycle Bin' to new its new name.
    5. Repeat step 4 until you have finished with searching and changed all values to its new name.
    6. Close regedit and hit F5 on desktop to see the new name on screen.

    Note: As a good practice, always backup your registry before changing anything although changing 'Recycle Bin' name is a simple tweak and doesnt affect anything else.
    this article is taken from internet if it is a copyright of someone please notify me .

    0 comments:

    how to made your own server?

    Your Own Home Server - Introduction

    An Introduction

    In this tutorial you will learn how to step up your own server. This server will be comprised of Apache 1.3.5, PHP 4.2.0, and MySQL 3.23.49. This tutorial will address the basic setup of a server on your own computer. This means the removal of hassles of dealing with the company that is running a remote web server. It will be easy to modify. You can add any thing you want to it, be it CGI/Perl, Zope, Roxen, etc, all by your self. You will have unlimited disk space, well at least as big as your hard drive is =) Now that you know the advantages, it is time that I tell you what i used, and what you will need.

    What I used
    * Windows 2000 - NOTE that if you are using 2k you WILL NEED Administrative Privileges. If you don't then get them somehow =) If you are on 95, 98, NT, XP, ME, I
    * Apache 1.3.6 - I tried to use 2.0 but I could not get it work. I also feel that 1.3.6 is tried and true, so why mess with greatness.
    * Mysql 3.23.49 - The newest version of MySQL when I set up my server. MySQL also the is the best PHP supported Database, and well love PHP don't we.
    * PHP 4.2.1 - The latest and greatest PHP release. -nt

    What you will need
    * Apache 2 - Link: h**p://www.apache.org/dist/
    * Mysql 3.23.49 - Link: h**p://www.mysql.com/downloads/mysql-3.23.html
    * PHP 4.2.0 - Link: h**p://www.php.net/downloads.php
    * Windows - This tutorial is ONLY written for new versions of Windows.

    Once you have downloaded all the programs you are ready to continue.

    1. Installing Apache

    Installing Apache

    The first step is to download Apache for Windows. Before you install it make sure that any other server software is removed. Remove it all via the control panel.On

    Once you have clicked on the executable, a screen should com up that looks like this. Go ahead and click on next

    user posted image

    Of course you plan to abide be the license agreement, so click on I accept.... and click on next.

    user posted image

    You really don't need to read this, but if you want you can. Read it if you want feel informed. When you are ready click on next.

    user posted image

    Here is where the actual setup of Apache begins. For Network Domain put in localhost as for Server Name You want these both to be localhost because the server is running locally, on your computer. It doesn't matter what is in email field, just put in yours. No one will no it because it's just you.

    user posted image

    For the sake of this tutorial it is better to just leave it as it is because, later in the tutorial I will show you how to start the server with one click of the mouse, and for the sake of ease, it will be easier for you to follow along. You can change it if you want, but you will have to realize where to substitute it. For me the root drive is E: but for you will probably be C:

    user posted image

    Once you have all the jazz set up, it is time to install the server. If you are on w2k or XP be sure that you have Administrative permissions or you will get an error about half way through the install saving cannot access msvrt32.dll or something. If you get that error run it again when you have admin privileges. Once you are ready click on install.

    user posted image

    If all went well you just see a screen similar to this. Now it is time to test the install of apache. Click on Start > Program Files > Apache HTTP Server and look for start Start Apache in Console. Click it. Once it says Apache XXXXX running, press Windows Key + R and type -http://localhost/. If the install works you should see a page saying that it works. If all is set and done, continue to the next step.

    user posted image
    ______________________________________________________________________
    2. Installing PHP
    Once you have clicked on the executable, a screen should come up that looks like this. Go ahead and click on next.

    user posted image

    Of course you plan to abide be the license agreement, so click on I accept.... and click on next.

    user posted image

    For this information, we will want the simple standard install. Chances are you if you are reading this tutorial, you will probably not even want to talk about advanced =)

    user posted image

    This is the mail setup, just enter localhost, and me@localhost.com. These are not important, because you, the admin, are the only person that will use the server, and you will be the one handling errors.

    user posted image

    We are going to want this install to work is Apache, so click on Apache, and move on.

    user posted image

    Once you have all the jazz set up, it is time to install the server. If you are on w2k or XP be sure that you have Administrative permission or you will get an error about half way through the install saving cannot access msvrt32.dll or something. If you get that error run it again when you have admin privileges. Once you are ready click on install.

    user posted image

    After the install is done you should get something that says you will have to manually configure apache to use php. Assuming you have a working Apache server installed, make sure that it is not running. Navigate to C:\Program Files\Apache Group\Apache\conf\ open the httpd.conf file. Note that you can also get to the http.conf from the start menu. Start > Program File > Apache HTTP Server > Configure Apache Server > Edit the Apache httpd.conf Configuration File and the window will open up in notepad. Now hit Ctrl + End if you see something like what follows, you can skip this step. If you do not see that code, copy it. This code will only work if you used the default install folder when you installed php. If you did, copy that code and paste it into the end of the file. Select the code to right, and hit crtl + c , then go into the httpd.conf file and hit ctrl + v and save the file.

    ScriptAlias /php/ "c:/php/"

    AddType application/x-httpd-php .php .phtml

    Action application/x-httpd-php "/php/php.exe"

    Now that we have php installed, it is time to test it. Open up notepad and type the code to the right. Save it as phpinfo.php. Remember to set it as all files in the drop down menu, or the file will be a text file. Save in the Directory: C:\Program Files\Apache Group\Apache\htdocs. htdocs is the directory where all the files go. You can create endless dir's and browse them. For Example E:\Program Files\Apache Group\Apache\htdocs\mydir\myfile.php could be accessed as http://localhost/mydir/myfile.php. Once you have that file saved. You will need to start the Server. Click: Start > Program File > Apache HTTP Server >; and look for something like Start Apache in Console. After you have found it, launch it. You should get a window saying that Apache is running. Now go to Start > Run > and type in -http://localhost/phpinfo.php. If you don't see anything, php is not installed correctly. If php is installed correctly, you will see a few large tables, displaying php's configuration. Now Your are 1/2 done!
    ______________________________________________________________________
    3. Installing MySQL
    Once you have clicked on the executable, a screen should com up that looks like this. Go ahead and click on next.

    user posted image

    Of course you plan to abide be the license agreement, so click on I accept.... and click on next.

    Just like before you should leave the default dir alone, so you will be able to follow along with me when I show you how to start and stop all the aspects of the server.

    Stay with the typical installation. Just like before, if you don't have admin privileges, the install will be faulty. After you click next, the install will begin. After the install has finished, move on to the next step.

    Now you have to set up the root account. The root account is the absolute admin of the system, the highest possible. Click on Start > Run and type cmd to open up the command prompt. You are going to have to navigate to where MySQL is installed. Type C: > Enter > cd mysql > Enter > cd bin > Enter. Now you have to tell setup the root settings. Type mysqladmin -uroot password InsertYourPasswordHere then hit enter.

    To see an image of the screen, -h**p://www.webmasterstop.com/tutorials/images/doscreen1.gif

    What is the point of having a database if you can't easily administer it! That is where phpMyAdmin comes into play. phpMyAdmin is a free piece of software written in php that makes the administration of a mysql or many other types of databases easy. You will want to download (h**p://prdownloads.sourceforge.net/phpmyadmin/phpMyAdmin-2.2.6-php.zip?downloadrelease_id=85832)the latest version. Save it in the htdocs folder. Once it is done downloading it, right click on it and select Extract > To Here. When it is done you should end up with a directory in the htdocs folder called phpMyAdmin-2.2.6 To make it easier to access, rename it to phpMyAdmin. After you have renamed it, click on it and look for a file called config.inc Open it. This is where you set the configuration of phpMyAdmin. When you open it up, it should look similar to the image to your side. On yours there should be a few things missing. The $cfgPmaAbsoulteUrl and $cfgservers[$i]['password']. You will need to fill those in between the quotes. for the $cfgPmaAbsoulteUrl enter -http://localhost/phpMyAdmin/ if you followed my instructions to the letter. If you did not rename it or extracted to a different directory, put that in there. For the $cfgservers[$i]['password'] enter the password you entered when you were setting MySQL in the set above. You can refer to the image for help. After you have put the right things in save the file.

    To see an image of the screen, -h**p://www.webmasterstop.com/tutorials/images/phpmyadminscreen1.gif

    Now we want to test the install of mysql, php, phpmyadmin, and apache all at once. Start apache in console like we did before. Now, you are going to need to start mysql. For myself I made a file that would start mysql for me. Open notepad and type: start c:\mysql\bin\mysqld-nt.exe --standalone and save that as Start MySQL.bat. Once you have saved it, click it. A window should open and then close. Mysql is now running on your computer. After mysql and apache are started go to run again and type -http://localhost/phpMyAdmin/index.php and if everything is installed correctly phpmyadmin should so up. You are almost done! Now we have the easy part =)

    4. Finishing it all up

    Wow! We mad it through the whole process. Now we want to simplify the whole process of controlling the server. I made a toolbar with all the things I needed. I made a new folder on my desktop and called it Server Folder and put all the stuff there. I made a new shortcut and gave it a value of -http://localhost/ made a shortcut to the PHP Documentation page. Another shortcut to my php editor, which is now unavailable. The phpMyAdmin shortcut is set to -http://localhost/phpMyAdmin/index.php. I made another shortcut htdocs. I moved the Start Apache in Console program that was in the start menu folder and moved it to the server folder. You can take the Start Mysql file you made in the last page and move it to the new folder. After you have put all the desired things into that folder, right click on a blank space in stat menu task bar (where the program boxes lie) and select Toolbars > New Toolbar and navigate to the folder. Voila!

    Now all you have to do is click Start Apache in Console , Start Mysql, and Lauch browser biggrin.gif
    this article is taken from internet if it is a copyright of someone please notify me .

    0 comments:

    how to do reverse coding?

    REVERSE CODING

    ----------------------
    REVERSE CODING
    ----------------------


    # Released by Cybnet Security Group
    # legalz: modify and use at will, if you make any changes, improvements, updates or use the code
    # in another project, please send us what you did and give credit
    # if you have any questions, post them at forum.hackerthreads.net
    # be sure to check out hackerthreads.org for updates and new tutorials/downloads

    Copyrights reserved to k33t, 2002 from CYBNET Security Group
    ----------------------------------------------------------------------------------------------------

    Index:
    -------
    1.Introduction
    2.Disclaimer
    3.Hexadecimal
    4.RAM and ROM
    5.ASM
    6.Needed programs
    7.Cracking
    8.Conclusion
    ---------------------------
    ---Introduction----------

    Welcome to my Reverse Coding tutorial! In this paper, you will
    learn how to crack and modify your own software. I'll try to get
    into as much detail as possible, yet also dumb it down a bit. =)
    ------------------------------------------------------------------------------------------------------
    ---Disclaimer------------

    All information is purely for educational purposes only! The author
    cannot be held responsible for any (ab)use of this information.
    USE AT YOUR OWN RISK!!!
    ------------------------------------------------------------------------------------------------------
    ---Hexadecimal----------

    To begin, I'm going to teach you about hexadecimal, so if you already
    know it, then move on. Even if you do already know it, I suggest
    sticking around for a refreshment of your memory.=)

    Hexadecimal, or hex as it's more commonly known, is a base 16
    numbering system. Base 16 meaning that it consists of 16 numbers:
    0-9 and A-F. Each of these numbers (A-F=10-16) have a value of 4 bits
    and are also called nibbles. In representing a hexadecimal number, one
    would write an "0x" before the actual bit set. 0x is simply a tag put
    before a hex number to let programmers know that it is in fact, hex.
    When writing hex, you will not need to use this prefix.

    If you haven't already noticed, the 0x prefix looks similar to that of exponential
    notation. Actually this is where 0x has been derived, seeing as how
    hex is simply a number that has been raised to a power of 16.
    This means 10 in hexadecimal represents the value 16+0, or 16. So check
    out this example:

    0xB3 (hex)= 2*16(squared)+11*16(to the 1st power)+3*16(to the power of 0 )
    =2*256+11*16+3=691 (decimal)

    Yeah, you could do all of that, or you could be lazy and use an automated
    program that does it all for you. Why do you need to know hex? Because
    it's used by every piece of software and hardware. How? Memory based address
    allocation. Here's an example:

    When you clicked on your browsers icon to launch it, the click triggered a "call"
    (an asm function that will be discussed more in depth in later chapters.) which
    went back to the programs memory with the "click in it's hand." It finds the
    address where the code is that makes the program launch and executes it. The
    address is written in, you guessed it, hex. An example of an address would be
    something like this:

    101c5018

    5108 would be the actual specific address and 101c would be the sector
    of RAM were the address is located. Those are the basics of Hexadecimal
    You should probley read this chapter againbecause getting a firm grasp on hex
    is essential to cracking and moding programs.
    ----------------------------------------------------------------------------------------------------------
    ---RAM and ROM--------

    In this section we are gonna learn about RAM and ROM. Many people kno about
    the hardware part of RAM and ROM and that's gonna be very useful to you......
    just not in this tutorial. =) We are about to learn about the "software" side. I use the
    term software loosly in that software tends to have a GUI (Graphical User Interface)
    and this does not. BUT, there are ways to access and modify the behavior of it that
    I will talk about in this chapter, as well as in the next. To start off, I'll answer some
    common questions:

    What is RAM?

    RAM (Random Access Memory) is basically memory and the process of accessing it.
    The term "Random Access Memory" was approprietly given to this memory unit because
    when executing a command, the CPU doesn't have to scroll through all the memory on
    your PC until it finds the right address. It "randomly" whips out the addy from it's back
    pocket and serves it up.This process is both quick and efficient. Learning this process
    will help you understand the ASM functions in the next chapter.

    How does RAM work?

    When a command is issued and the memory is pulled from file, it must first go through
    what is called a "vector". A vector is a "gateway" or a "sector" of RAM where the address
    of the function is stored with others of it's own kind. An example of a vector would be
    something like this:

    8c0000b4-8c00ffff

    This means that all "addressii" (hehe) that are between those values are stored in that
    sector of RAM. A vector acts as a gateway in that, first, pass through a vector to get to
    address. Your average program probley has about 30 to 40 main vectors, sectioning
    off from boot until exit. Knowing the vector of an addy or a function will greatly reduce
    your headache when you start searching for it.

    ROM. ROM is a part of memory that doesn't change. (Although we can change it.=) )
    Boot ROM for instance, follows the same plan of action it is called upon. ROM also has
    vectors, just like RAM. ROM is not that important when it comes to cracking to we will
    leave it alone for now.

    Back to RAM. Believe it or not, but addressii (there I go again, I'm such a g33k.)
    actually follow certain formats or syntax's for certain functions. Take hot keys for
    example: In the under ground, we call them "Joker commands". By pressing a certain
    combonation of keys, a program will run, close, be stupid, whatever. The syntax for a
    Joker command is as follows:

    0d-aaaaaf
    000zvvvv

    Let's examine this format a little closer.

    0d= The proclemation of a specifyed format

    aaaaa= The address of the function

    f= The float or remainder; "Floating point number" ; decimal

    000= "NOP" No operation

    z= The "Booleon" as we the C++ programmers call it. A booleon is an "IF, THEN" statement.
    "IF this is true, THEN do this." Value 0= equal; 1= different; 2=less than; 3=greater than.

    vvvv= The combonation of hex values (The values of the keys pressed) used to execute the "CALL"

    Say the "A" key had a vlaue of fffb and the "B" key has a vlaue of fffd. You would then add both
    values using a hex calculator and get fff9 as the sum. The output on you calculator would
    show 1fff8. Add the first value and the last value to find the fourth byte segment. So say
    we've found the address of the Joker function (usually in the boot ROM sector) commonly
    called the "Maple address" and we are ready to program in some hex code. Our code may
    look like this:

    0d7ae671
    0000fff9

    This means that IF the value of fff9 (A and B) is equal (0) to the address (aaaaf) of the function,
    THEN execute it. See? Easy isn't it? You'll need to know things like this when modding programs
    as a use of executing of your arbitrary code in certain parts of your program at a certain time.
    Joker commands are also reversable in that if you enter the same code except with a 1,2, or 3,
    in the z slot and by changing the button combonations. Reversable meaning terminating the
    function or other functions that were started. A good use for this is for firewalls and babysitting
    programs. Are you on a college machine and can't download stuff because of that pesky firewall?
    Crack it open and program in some Joker commands so you can turn it on and off at will
    WITHOUT the administrator's password!
    --------------------------------------------------------------------------------------------------------------
    ---ASM-----------------------

    To start off with our small and to the point ASM section, I'll warn you in advance, after reading this,
    you'll need to go take a shower cause this is disgusting! Here we go!

    To begin, I'm gonna define for you some functions that you'll be seeing alot of, and be using. Here they are:

    .:Hex:. .:ASM:. .:MEANING:.

    75,0f85 jne jump if not equal
    74,0f84 je jump is equal
    eb jmp jump directly to
    90 nop no operation
    77,0f87 ja jump if above
    0f86 jna jump if not above
    0f83 jae jump if above or equal to
    0f82 jnae jump if not above or equal
    0f82 jb jump if below
    0f83 jnb jump is not below
    of86 jbe jump if below or equal
    0f87 jnbe jump if not below or equal
    0f8f jg jump if greater
    0f8e jng jump if not greater
    0f8d jge jump if greater or equal
    0f8c jnge jump if not greater or equal
    0f8c jl jump if less
    0f8d jnl jump if not less
    0f8e jle jump if less or equal
    0f8f jnle jump if not less or equal

    The easy thing about most of the functions in ASM are that they sound like what they mean.
    Jump, means of coarse, to Jump from one thing to another. Example:

    "jmp 00401744" would mean to jump directly to the address 00401744 once the code
    hits the function.

    Let's look at "CALL". Call is a function that is used to "call" a certain task, string, address, whatever.
    Take a look at this example:

    "Call 0040ccc2" this would of coarse call the address 0040ccc2 and use it. Those are the functions
    you'll be using.

    The reason why I'm not going into loads of detail in this chapter is because when
    cracking software, not an extensive amount of knowledge of ASM is needed. If you want
    to know more or need help with something, e-mail me at the address provided at the end of
    this tutorial. This chapter wasn't so nasty was it? Nah, it was easy =)
    ------------------------------------------------------------------------------------------------------------------------
    ---Needed Programs----------------

    The programs you will need are as follows:

    WDasm 8.9 or Higher
    Hiew 6.1
    Softice for win9x v3.24
    SubmitWolf(demo)v4.01 (http://www.trellian.com/swolf)
    Programming Language (C,C++,Pascal,ASM whatever you would like) Prefably C for this tutorial!
    And a brain (no seriously)
    --------------------------------------------------------------------------------------------------------------------------
    ---Cracking-----------------------------


    Ok, here we go! The first thing you need to do is to open up SoftIce and then swolf32.exe which is the name given to our
    target program. Go to the help menu and select register. Here's where your brain will come in, start to look
    for how the protection is running by entering some random crap into the blank space. Don't press the OK button yet though.
    Instead, press CTRL-D to bring up SoftIce. What we are gonna try to do is define a breakpoint, using BPX hmemcpy.
    Hit CTRL-D again and it will bring you back to the program. Click OK on the box and SoftIce will again pop up. Now press F12
    and it will bring you to the target program code. Scroll down a few lines and find:

    :004167D9 8D4C2410 lea ecx, dword ptr {esp+10}--;ecx=the random crap you typed in.
    :004167DD 8D94290000000 lea edx, dword ptr {esp+00000090}-;edx=name
    :004167E4 51 push ecx
    :004167E5 52 push edx
    :004167E6 E8B5450100 call 0042ADA0----;this is the call which calculates the serial
    :004167EB 83C410 add esp, 00000010--;
    :004167EE 85C0 test eax, eax----;and return eax=1 if true (booleon =) )
    :004167F0 0F8596000000 jne 0041688C----;jump to registered
    :004167F6 8D442408 lea eax, dword ptr {esp+08}
    :004167FA 8D8C2488000000 lea ecx, dword ptr {esp+00000088}
    :00416801 50 push eax
    :00416802 51 push ecx
    :00416803 E868470100 call 0042AF70----;this call tests our serial
    :00416808 83C408 add esp, 00000008---;
    :0041680B 85C0 test eax, eax----;for v3.XX one.
    :0041680D 7433 je 00416842;jump is equal

    The call that we want to focas on is at 004167E6. This call tests wether our serial is for the correct version or not.
    Let's trace the call 004ADA0:

    *Referenced by a CALL at address:
    :0042ABFC
    :0042ADA 83EC30 sub esp, 00000030
    :0042ADA3 55 push ebp
    :0042ASA4 56 push esi
    :004ADA5 57 push edi
    :0042ADA6 8B7C24444 mov edi, dword ptr {esp+44}--;edi=our fake serial
    :004ADAA 85FF test edi, edi
    :004ADAC 0F4A7010000 je 0042AF59----;die if empty
    :004ADB2 8B6C2440 mov ebp, dword ptr {esp+40}--ebp=our name
    :0042ADB6 85ED test ebp, ebp
    :004ADB8 0F849B010000 je 0042AF59---;die if empty
    :004ADBE 8A07 mov al, byte ptr {edi}--;compare 1st byte of serial with 'p', die
    :0042ADC0 3C50 cmp al, 50----;
    :0042ADC2 0F8587010000 jne 0042AF4F----;if not equal
    :0042ADC8 807F0134 cmp byte ptr {edi+01}, 34--:compare byte of serial with '4'
    :004ADCC 750C jne 0042ADDA----;
    :0042ADCE C70500C8430000000000 mov dword ptr {0043C800}, 00000000
    :0042ADD8 EB1C jmp 0042ADF6

    As we can see by the above, the code tells us that the first value of our serial will
    be 'p' and a cycle of a four byte algorythm. I could go on and on about all of the internals
    of all this stuff but that would be going beyond the scope of this tutorial. The idea was to show
    how to crack this pro, and thats what I'm going to do. Based on the information I've given you, and the
    information that you can deduce from reading the code, I've written a small key generator in C.
    If you know C, then you'll be able to tell where i got the algorythms to write it. So here it is:

    #include<stdio.h>
    #include<conio.h>

    int main(void)
    {
    long code=555583,count1,count2;
    char name[25],cod[5],type='0';
    clrscr();
    textcolor(14);
    printf("This is a simple key-generator written by k33t of CYBNET Security Group");
    printf("=================================================");
    text color(10);
    printf("SubmitWolf(demo)ver4.1 cracked by k33t");
    textcolor(14);
    printf("%c%c%c",0x10,0x10,0x10");
    textcolor(12);
    printf("Yup")
    prinf("-November 2002");
    prinf("'\n\nSelect Edition PRO(0) or Enterprise(1) (0/1)=");
    scanf("%c",&type);
    if(type=='1')code=557283;
    getchar();
    prinf("Enter Registration Name=");
    scanf("%[^\n]",name);
    for(count1=0;count1<=3;count1++
    cod[count1]=name[count1];
    for(count=1;count1=3;count1++){
    for(count2=0;count2<=3;count2++)
    cod[count2]=cod[count2]*(code%100);
    code=code/100;
    }
    for(count1=0;name[count1]>0;count1++);
    for(count2=0;count2<=3;count2++)
    cod[count2]=cod[count2]^(name[count1]+3);
    for=(count1-3;count1>=0;count1--){
    code=code+(cod[count1]&0xFF);
    if(count1>0)
    code=code*0x100;
    }
    if(code<0)code=-code;
    for(;code<10000;) code=code*10;
    for(;code>999999;) code=code/10;
    printf(Your Serial Number=P%c4-%ld",(type=='1')? 'E':'4'code);
    return ;
    }

    Ok! So! An overall conclusion of this code is:

    1.First two characters of the serial must be either 'PE' or 'P4'.
    2.Multiply every first four characters or our name with every byte of our serial before '-'
    3.XOR every four byte with every byte of our name.
    4.Convert to positive number if<0.
    5.Convert to number between 10000 and 1000000.

    Forgive me if this code is buggy as I wrote it very quickly in the little spare time I had.

    -----------------------------------------------------------------------------------------------------------
    ---Conclusion-------

    Well how was your first cracking expierience? Not bad eh? Ok well if you have any questions,
    problems,comments,.....criticsms.......you can e-mail them to me at:

    k33t@hushmail.com
    ------------------------------
    this article is taken from internet if it is a copyright of someone please notify me .

    0 comments:

    how to reset bios password ?

    Here's a DOS trick for Windows 9x, that will reset (delete) your motherboard's BIOS password (aka CMOS password) without any need to open up your computer to remove the battery or mess with jumpers.

    This method can come in very handy in the event you ever lose and forget your BIOS password or if you acquire used computers where the unknown previous owners had BIOS passwords set (in fact, this happened to me long ago—I was given a used computer, but there was no way I could enter the CMOS to make changes). It's important to note here that the password we are talking about is only the one that prevents a user from entering the BIOS setup at bootup, not the one that stops you from getting past the boot.

    Normally, at bootup you can press a key (usually the DEL key) to access your BIOS allowing you to view it or make changes. With a password set, there is no way to enter setup. Though a password can provide a basic and very effective level of PC security, losing it can be a real headache if you don't know how to fix the problem.

    The MS-DOS command that will makes this trick possible is the DEBUG command (debug itself is a utility—debug.exe—which is located in your Windows Command folder). This is not a command to be taken lightly—in other words, it's not a command to play with! You can cause serious corruption with this command and can end up not being able to even boot your computer! Debug is used to work with binary and executable files and allows you to alter (hex edit) the contents of a file or CPU register right down to the binary and byte level.

    To begin debug mode, type debug at a MS-DOS prompt or you can specify a file, i.e., DEBUG FILE.EXE. There is a difference in screen output between the two methods. When you type DEBUG alone, debug responds with a hyphen (-) prompt waiting for you to enter commands. The second method, with a file specified, loads the file into memory and you type all the commands on the line used to start debug. In this tip, we will be writing to the BIOS, so the first method is the one that would be used. All debug commands can be aborted at any time by pressing CTRL/C.

    Accessing BIOS with DEBUG
    The basic trick will be to fool the BIOS into thinking there is a checksum error, in which case it resets itself, including the password. This is done by invalidating the CMOS and to do that we must know how to access the BIOS and where the checksum value of the CMOS is located so that we can change it. Access to the the BIOS content is via what are known as CMOS Ports and it's Port 70 and 71 that will give us the needed access. On almost all AT motherboards, the checksum is located at hexadecimal address 2e and 2f and filling the address 2e with ff is all you should have to do to invalidate the checksum.

    Here's what to do if you ever need to reset the password and have no other method, and you don't want to open up your computer to remove the battery or jumpers.

    Note! Do this at your own risk. I can only tell you that it has worked for me more than once and has worked for others as well. But I cannot make any guarantees. When I did this, I took a willing risk. The BIOS was Award Modular BIOS v4.51PG

    Restart your computer in MS-DOS mode.


    When you get to the C:\> or C:\WINDOWS> prompt, type DEBUG and press Enter.


    A hyphen (-) prompt will appear waiting for you to enter commands.


    Enter the following commands, pressing Enter after each one. Note: the o is the letter o and stands for OUTPUT.


    o 70 2e


    o 71 ff


    q


    After the q command (which stands for QUIT), enter Exit.


    Then try to enter your BIOS at bootup. The password prompt should now be gone and you should now have full access to it again. However, you will now be at the default BIOS setttings and may want to change them to your preference. You may also want to have your drives autodetected again.
    In closing, I should state that in the case of a lost BIOS password, your first step should always be to contact your manufacturer to see if a backdoor password is available that will allow you to bypass the forgotten password.

    There are many sites on the net that list backdoor passwords you can try, but beware that some BIOS that are set up to lock up if you enter the wrong password more than a certain number of times, usually only 3 times!
    this article is taken from internet if it is a copyright of someone please notify me .

    0 comments:

     hello iam new to blogger and by the help of this site iam trying to communicate witht friends s all others because of privacy .s posting  some documents about electronics thanks!

    0 comments:

    Business

    Powered by Blogger.

    Find Us On Facebook

    Featured Posts

    Social Networks

    About us

    Breaking News

    Flickr Images

    Popular Posts