Thursday, June 11, 2009
Friday, May 15, 2009
Replace corrupted windows xp system files
2.Go to Run (win+R)
3.Type VFC/SCANNOW
4.That's all.System files will now be restored.
!<#@!_££!_
Saturday, May 2, 2009
MG University B.TECH S8 Computer Science Syllabus
RT 801 2+1+0
Module1
Introduction: Security basics – Aspects of network security – Attacks – Different types – Hackers – Crackers – Common intrusion techniques –Trojan Horse, Virus, Worm – Security services and mechanisms.
Module 2
OS Security – Protection Mechanisms –Authentication & Access control – Discretionary and Mandatory access control – Authentication mechanisms – Official levels of computer security (DoD) - Security breaches – Concept of a hole - Types of a holes – Study of the security features for authentication, access control and remote execution in UNIX, WINDOWS 2000
Module 3
Cryptography: Basic Encryption & Decryption – Transposition & substitution ciphers – Caesar substitution – Polyalphabetic substitutions – Crypt analysis – Symmetric key algorithms – Fiestel Networks – Confusion – Diffusion – DES Algorithm – Strength of DES – Comparison & important features of modern symmetric key algorithms – Public key cryptosystems – The RSA Algorithm – Diffice Hellman key exchange – comparison of RSA & DES – Message Authentication & Hash functions – Digital signature
Module 4
Network & Application Security: Kerberos – X509 Authentication service – IP security Architecture – Secure socket layer – Electronic mail security – Pretty Good privacy – S/MIME – secure Electronic Transactions – Firewalls - Security mechanisms in JAVA platform – Applet security – Security policy and Security Manager.
Module 5
Database Security: - Security issues – SQL security DAC based on granting & revoking privileges – MAC for multilevel security – Statistical database security.
Text Books
Module1, 4 Network Security Essentials Applications & Standards, William S., Pearson Education Asia
Module2 Modern operating System, Andrew S. Tanenbaum, Pearson Education Asia
Using JAVA 2 platform, Joseph L. Weber, Prentice Hall of India
Module3 Cryptography and network security principles and practice, William Stallings, Pearson Education Asia
Information theory coding and cryptography, Ranjan Bose, TMH
Module 4,5 Designing security Architecture Solutions, Jay Ramachandran, Wiley Dreamtech
Module5 Database Security Mechanisms for Computer Network, Sead Muftic, John wiles
References
Security in Computing - Charles P. Pfleeger IEEE Computer Science Press
Database Security Mechanisms for Computer Network- Sead Muftic, John wiles
Designing Security Architecture Solutions – Jay Ramachandran, Wiley dreamtech
Firewalls Complete - Marcus Gonsalvus, TMH
Networking Technologies - Jaisal, Galgotia Publication
Security in Computer Operating System - G.O.Shea, NCC Blackwell Manchester Oxford
Mastering JAVA security: Cryptography, Algorithms and Architecture - Rich Helton, Wiley Dreamtech
Implementing IPv6- Mark A. Miller P.E, IDG Books
HIGH PERFORMANCE COMPUTING
R802 2+1+0
Module1
Introduction to parallel processing - Trends towards parallel processing - Parallelism in uniprocessor - Parallel computer structures-Architecture classification schemes - Indian contribution to parallel processing.
Module 2
Principles of pipelining and vector processing - Linear pipelining - Classification of pipeline processors - General pipelines - Instruction and Arithmetic pipelines –Design of Pipilined instruction unit-Prinnciples of Designing Pipeline Processors- Instruction prefetch and branch handling- Dynamic pipelines - Architecture of Cray-1.
Module 3
Array processors - SIMD array processors - Interconnection networks - Static vs dynamic networks - mesh connected networks - Cube interconnection networks - Parallel algorithms for array processors - SIMD matrix multiplication-Parallel sorting on array processors - Associative array processing - Memory organization.
Module 4
Multiprocessor architectures and Programming - Loosely coupled and Tightly coupled multiprocessors - Interconnection networks - Language features to exploit parallelism - Process synchronisation mechanisms.
Module5
Dataflow computers - Data driven computing and Languages - Data flow computers architectures - Static data flow computer -Dynamic data flow computer -Data flow design alternatives.
Text Book
Computer Architecture & Parallel Processing - Kai Hwang & FayeA.Briggs, McGraw Hill
References
Elements of Parallel computing - V. Rajaraman - PHI
Super Computers - V. Rajaraman - Wiely arstern
Parellel Processing for Super Computers & AI - Kai Hwange & Douglas Degneot
Mc Graw Hill
Highly parallel computing - George S. Almasi, Allan Gottlieb - Benjamin Cumings Publishers.
HIgh Performance Computer Architecture - Harold S. Stone, Addison Wesley.
Advanced Computing - Vijay P.Bhatkar, Asok V.Joshi, Arirban Basu, Asok K.Sharma.
PRINCIPLES OF PROGRAMMING LANGUAGES
R803 3+1+0
Module1
Introduction – Role of programming languages - Effects of Environments on languages - Language Design issues - Virtual computers and binding times, Language Paradigms.
Module2
Data types - Specification of data types, implementation of elementary data types, Declarations, type checking and type conversion - Assignment and Initialisation - Structured data types - Specification of data structure types, Implementation of data structure type - Declarations and type checking for data structures.
Module 3
Abstract data types, Encapsulation by subprogram - Type definition, storage management - Sequence Control - Implicit and Explicit sequence control, sequencing with arithmetic expressions, sequence control between statements.
Module 4
Subprogram control - Subprogram sequence control, attributes of data control, Shared data in subprograms - Abstract data types revisited, Inheritance, Polymorphism.
Module 5
Advances in Language design - Variations of subprogram control, Parallel programming, Introduction to exception handling - Exception handling in JAVA, Hardware developments, software architecture.
Text Book
Programming Languages, Design & Implementation - Terrence W. Pratt, Marvin V. Zelkowitz., Pearson Education Asia / Prentice Hall of India
Reference
Programming Languages - Robert W Sebesta, Pearson EducationAsia
ARTIFICIAL INTELLIGENCE
RT 804 3+1+0
Module 1
Introduction – Definitions – AI application areas – Example problems- Problems and problem spaces - Problem characteristics – Problem solving by searching, Searching strategies – Breadth first search, Uniform cost search, DFS, Depth – Limited search, Bi-directional search – Constraint satisfaction search.
Module 2
Informed search, A* algorithm, Heuristic functions – Inventing Heuristic functions - Heuristic for constraint satisfaction problem – Iterative deepening – Hill climbing – Simulated Annealing.
Module3
Game playing and knowledge structures – Games as search problem – Imperfect decisions – Evaluation functions – Alpha – Beta pruning – state of art game programs, Introduction to frames and semantic nets.
Module 4
Knowledge and Reasoning – Review of representation and reasoning with Logic – Inference in first order logic, Inference rules involving quantifiers, modus ponens, Unification, forward and backward chaining – Resolution.
Module 5
Introduction to Prolog – Representing facts – Recursive search – Abstract data types – Alternative search strategies – Meta predicates, Matching and evaluation, meta interpreters – semantic nets & frames in prolog.
Text Books
Module 1,2,3,4
Artificial Intelligence – A modern approach, Stuact Russell – Peter Narang, Pearson Education Asia
Artificial Intelligence Rich E. - McGraw Hill Booq Company
Module 5
Artificial Intelligence, George F Luger, Pearson Education Asia
References
An Introduction to Artificial Intelligence – Eugene Charniak & Drew McDermot, Pearson Education Asia
ELECTIVE - II
R805 3+1+0
CLIENT SERVER COMPUTING (ELECTIVE - II)
RT 805-2 3+1+0
Module 1 Introduction
History - uses - Client Server Computing & Hetrogenous Computing - Cross Platform Computing Distributed Computing - The costs of Client Server Computing - Advantages and Disadvantages - Client Server Databases.
Module 2 Design
Fundamentals of client server design - Managing the interaction of client and server - Communications Techniques protocols & Client server interaction protocols - Preparing applications for client server - Optimizing applications for client server - Example client server implementations - Request acceptance dispatching - Execution of requests - Client server interaction using message.
Module 3 Multitasking
Multi programming vs multitasking - Processor - Advantages and draw backs of multiple processor - Child and parent processor - Case study Novell Netware and Windows NT - Developing server applications - Threads - Server communication model.
Module 4 Synchronization
Scheduling implementations - processing queues - context switching pre emptive systems - critical sections - mutual exclusion - semaphores - semaphore implementations in NT & Netware.
Module 5 Communications
Network communication - Inter process communication - Building portable client server applications.
References
Novell's Guide to Client-Server Application & Architecture- Jeffrey D.Schqnk, Novell Press.
Client Server Computing - Dawna Travis Dewire, McGraw Hill.
Developing Client Server Applications - W.H.Inman, BPB.
Guide to Client Server Databases - Joe Salemi, BPB.
Client Server Strategies- David Vaskevitch, Galgotia.
ADVANCED NETWORKING TRENDS (ELECTIVE - III)
RT806-5 3+1+0
Module 1
Ethernet Technology – Frame format – Interface Gap – CSMA/CD – 10 mbps Ethernet, Fast Ethernet, Gigabit Ethernet, Wireless Ethernet – SONET – Sonet multiplexing, Sonet frame structure
Module 2
ISDN - Definition - Protocol architecture - System architecture - Transmission channels - ISDN interface, B-ISDN.
Module 3
ATM – ATM Principles – BISDN reference model – ATM layers – ATM adaption Layer – AAL1, AAL2, AAL3/4, AAL5 – ATM addressing – UNI Signaling – PNNI Signalling
Module 4
SATELLITE COMMUNICATION: Satellite communication principles - Geo stationary satellites - block schematic of satellite earth station - VSAT - VSAT networks - applications in personnel communication. (basic ideas only)
Module 5
Wireless Lan – Infrared Vs Radio transmission – Infrastructure & ad hoc n/w – IEEE 802.11 – Hiper Law – Bluetooth – Physical Layer – MAC layer – Networking – Security
References
Module 1
An introduction to Computer Networking - Kenneth C Mansfield, Jr., James L. Antonakos, PHI
Module 1,2,3
Communication Networks Fundamental Concepts & Key Architecture - Leon-Garcia – Widjaja, Tata McGraw Hill
Mobile Communication - Jochen Schiller, Pearson Education Asia
GRAPHICS AND MULTIMEDIA LAB
R807 0+0+4
Point plotting, line and circle drawing, Line and Polygon clipping, transformations, hidden line elimination, curves, polygon hatching, Multimedia programming, Visual programming, Animation
Any experiment according to the syllabus of R702 Computer Graphics may be substituted
PROJECT & SEMINAR
R709/ R808 0+0+4
Each student is required to present a technical paper on subject approved by the department. The paper should in general reflect the state of the art. He/ She submits a report of the paper to the department.
In addition to the seminar He/She shall undertake a project work in the 7th semester itself in consultation with the guide(s). On completion of the project work, He/She shall present the work done before a panel of staff members, and submit a report of the project work done to the department.
VIVA -VOCE
R809
A comprehensive Viva-voce examination will be conducted to assess the students overall knowledge in the specified field of engineering. At the time of Viva-voce, certified report of seminar, mini project and project work are to be presented for evaluation.
s8
Friday, May 1, 2009
Google Search
1800-419-99999 (toll free from BSNL,MTNL lines)
And tell ur search querry.
Samsung's LED High Definition TVs for India
What is LED?
LED stands for Light Emitting Diode. Simply put, LED is an upgraded version of LCD screens which gives better picture quality while being more energy efficient and environment friendly, but they are costlier. In fact, Samsung says that its LED TVs reduce energy consumption by over 40 percent versus traditional LCD HDTVs of similar size.
The company has introduced 3 LED HD TV Series - Series 6 (40-inch), Series 7 (46-inch), and Series 8 (55-inch). While Series 6 and 7 are now available, Series 8 will be offered in May.
Picture Quality, Features
Each of the introduced LED HDTV Series claims to feature Mega contrast ratios (ultra-high contrast ratios) using Samsung's LED TV Engine.
These TVs use LEDs as their primary light source, rather than traditional Cold Cathode Fluorescent Lamps (CCFL). Benefits of using LEDs include ultra-high contrast ratios, slim depths that allow for more artful designs, plus increased energy savings.
Compared to a traditional CCFL, LEDs produce darker blacks that appear endlessly deep to the eye. The result is picture clarity that measures up to the natural colors, says the company.
Samsung's entire LED HDTV line-up incorporates a number of innovative features to reduce motion blur and image judder. All the three series boast Samsung's Auto Motion Plus frame interpolation technology to ensure crisp, easy viewing of sports, video games and movies.
By using Edge LED technology, Samsung has been able to shave all three series down to ultra-thin depths at just over an inch thick (1.16 inch or 29.9 mm thickness), without cutting back on connectivity options and include a built in tuner.
Samsung created a slim wall-mount solution - reducing the gap between the TV and the wall to around 0.6 inches, down from the two inches of bulkier solutions. The thin LED HDTV depth, coupled with the new wall-mount solution allows for a simple installation akin to hanging a picture frame.
Pricing
Samsung LED series will be available at a price between Rs. 1.25 to 3.5 lakh, LCD series at Rs 17,000-1.7 lakh and Plasma Series from Rs 59,000-1.35 lakh.
Wednesday, April 29, 2009
AVG Full Version
and install using the following key.
8MEH-RQXTV-MQOWD-E447R-MPHYD-PEMBR-ACED
!<#@!_££!_
UNIDO GLOBAL SOLUTIONS.
Get orkut scraps via SMS
2.Enter it in www.OrkutFeeds.Com and hit OK
3.Copy the feed url
4.Goto Google SMS channel( Labs.google.Co.In/smschannels )
5.Create a new channel
6.Select RSS/Atom feed and paste feed url there&submit
7.That's it
(the scrapbook shuld b public)
Missed call alert
for airtl der s mnthly charge.Activation dial *135*1#
Friday, March 27, 2009
MG University Results for B.Tech exams held in Dec-2008.
Thursday, March 26, 2009
Quantum Computers
The massive amount of processing power generated by computer manufacturers has not yet been able to quench our thirst for speed and computing capacity. In 1947, American computer engineer Howard Aikensaid that just six electronic digital computers would satisfy the computing needs of the United States. Others have made similar errant predictions about the amount of computing power that would support our growing technological needs. Of course, Aiken didn't count on the large amounts of data generated by scientific research, the proliferation of personal computers or the emergence of the Internet, which have only fueled our need for more, more and more computing power.
Will we ever have the amount of computing power we need or want? If, as Moore's Law states, the number of transistors on a microprocessor continues to double every 18 months, the year 2020 or 2030 will find the circuits on a microprocessor measured on an atomic scale. And the logical next step will be to create quantum computers, which will harness the power of atoms and molecules to perform memory and processing tasks. Quantum computers have the potential to perform certain calculations significantly faster than any silicon-based computer.
Scientists have already built basic quantum computers that can perform certain calculations; but a practical quantum computer is still years away.
Sunday, March 1, 2009
How to Create an RSS 2.0 Feed
If you can learn HTML, you can easily learn how to build your own RSS 2.0 feeds. I'll take you through the steps to creating an RSS feed from scratch.
Step 1: XML Declaration
Since RSS 2.0 must validate as XML, the first line in your rss feed must be the XML declaration.
The encoding is optional but recommended. If your using something other than UTF-8 be sure to change the above line.
Note: If you are using CFML and have whitespace due to the Application.cfm file you can reset the output buffer using
Step 2: RSS Channel
In this step we need to open up the rss tag, and the channel tag, all of your feed content goes inside these tags.
Step 3: RSS Feed Information
Next you place information about your RSS feed such as the title of it, the description, and a link to the the site.
http://www.example.com/
The lastBuildDate should be the date and time that the feed was last changed. Dates in RSS feeds should comply to RFC 822. In CFML the DateFormat mask would be ddd, dd mmm yyyy and the TimeFormat would be HH:mm:ss. Dates should be offset to GMT. The lastBuildDate tag is not required but is highly recommended.
Step 4: RSS Items
Next we enumerate over each RSS item, each item has a title, link, and description, publication date, and guid.
http://example.com/item/123
Make sure you escape any characters that might cause your XML to invalidate, these characters include <, >, & - I like to enclose any content that may contain HTML inside a CDATA section.
Note: In CFML you can use the XmlFormat function to escape special characters in XML.
Step 5: Close Channel and RSS tags.
Step 6: Validate your feed
Validate your feed using FeedValidator.org.
Other things to take note of
Content Type - See my post on content types for RSS feeds
Encoding - You should include the encoding in your Content-Type HTTP header, and in the XML declaration.
Styling - If you want to make your RSS feed look a little nicer you can CSS stylesheet for your RSS feed.
Categories - It's a good idea to include category tags in your RSS feeds as well, these go inside the item tag. You can give an item multiple categories by adding a tag for each on
An A-Z Index of the Bash command line for Linux.
alias Create an alias
apropos Search Help manual pages (man -k)
apt-get Search for and install software packages (Debian)
aspell Spell Checker
awk Find and Replace text, database sort/validate/index
b
bash GNU Bourne-Again SHell
bc Arbitrary precision calculator language
bg Send to background
break Exit from a loop
builtin Run a shell builtin
bzip2 Compress or decompress named file(s)
c
cal Display a calendar
case Conditionally perform a command
cat Display the contents of a file
cd Change Directory
cfdisk Partition table manipulator for Linux
chgrp Change group ownership
chmod Change access permissions
chown Change file owner and group
chroot Run a command with a different root directory
chkconfig System services (runlevel)
cksum Print CRC checksum and byte counts
clear Clear terminal screen
cmp Compare two files
comm Compare two sorted files line by line
command Run a command - ignoring shell functions
continue Resume the next iteration of a loop
cp Copy one or more files to another location
cron Daemon to execute scheduled commands
crontab Schedule a command to run at a later time
csplit Split a file into context-determined pieces
cut Divide a file into several parts
d
date Display or change the date & time
dc Desk Calculator
dd Convert and copy a file, write disk headers, boot records
ddrescue Data recovery tool
declare Declare variables and give them attributes
df Display free disk space
diff Display the differences between two files
diff3 Show differences among three files
dig DNS lookup
dir Briefly list directory contents
dircolors Colour setup for `ls'
dirname Convert a full pathname to just a path
dirs Display list of remembered directories
dmesg Print kernel & driver messages
du Estimate file space usage
e
echo Display message on screen
egrep Search file(s) for lines that match an extended expression
eject Eject removable media
enable Enable and disable builtin shell commands
env Environment variables
ethtool Ethernet card settings
eval Evaluate several commands/arguments
exec Execute a command
exit Exit the shell
expect Automate arbitrary applications accessed over a terminal
expand Convert tabs to spaces
export Set an environment variable
expr Evaluate expressions
f
false Do nothing, unsuccessfully
fdformat Low-level format a floppy disk
fdisk Partition table manipulator for Linux
fg Send job to foreground
fgrep Search file(s) for lines that match a fixed string
file Determine file type
find Search for files that meet a desired criteria
fmt Reformat paragraph text
fold Wrap text to fit a specified width.
for Expand words, and execute commands
format Format disks or tapes
free Display memory usage
fsck File system consistency check and repair
ftp File Transfer Protocol
function Define Function Macros
fuser Identify/kill the process that is accessing a file
g
gawk Find and Replace text within file(s)
getopts Parse positional parameters
grep Search file(s) for lines that match a given pattern
groups Print group names a user is in
gzip Compress or decompress named file(s)
h
hash Remember the full pathname of a name argument
head Output the first part of file(s)
history Command History
hostname Print or set system name
i
id Print user and group id's
if Conditionally perform a command
ifconfig Configure a network interface
ifdown Stop a network interface
ifup Start a network interface up
import Capture an X server screen and save the image to file
install Copy files and set attributes
j
join Join lines on a common field
k
kill Stop a process from running
killall Kill processes by name
l
less Display output one screen at a time
let Perform arithmetic on shell variables
ln Make links between files
local Create variables
locate Find files
logname Print current login name
logout Exit a login shell
look Display lines beginning with a given string
lpc Line printer control program
lpr Off line print
lprint Print a file
lprintd Abort a print job
lprintq List the print queue
lprm Remove jobs from the print queue
ls List information about file(s)
lsof List open files
m
make Recompile a group of programs
man Help manual
mkdir Create new folder(s)
mkfifo Make FIFOs (named pipes)
mkisofs Create an hybrid ISO9660/JOLIET/HFS filesystem
mknod Make block or character special files
more Display output one screen at a time
mount Mount a file system
mtools Manipulate MS-DOS files
mv Move or rename files or directories
mmv Mass Move and rename (files)
n
netstat Networking information
nice Set the priority of a command or job
nl Number lines and write files
nohup Run a command immune to hangups
nslookup Query Internet name servers interactively
o
open Open a file in its default application
op Operator access
p
passwd Modify a user password
paste Merge lines of files
pathchk Check file name portability
ping Test a network connection
popd Restore the previous value of the current directory
pr Prepare files for printing
printcap Printer capability database
printenv Print environment variables
printf Format and print data
ps Process status
pushd Save and then change the current directory
pwd Print Working Directory
q
quota Display disk usage and limits
quotacheck Scan a file system for disk usage
quotactl Set disk quotas
r
ram ram disk device
rcp Copy files between two machines
read read a line from standard input
readonly Mark variables/functions as readonly
reboot Reboot the system
renice Alter priority of running processes
remsync Synchronize remote files via email
return Exit a shell function
rev Reverse lines of a file
rm Remove files
rmdir Remove folder(s)
rsync Remote file copy (Synchronize file trees)
s
screen Multiplex terminal, run remote shells via ssh
scp Secure copy (remote file copy)
sdiff Merge two files interactively
sed Stream Editor
select Accept keyboard input
seq Print numeric sequences
set Manipulate shell variables and functions
sftp Secure File Transfer Program
shift Shift positional parameters
shopt Shell Options
shutdown Shutdown or restart linux
sleep Delay for a specified time
slocate Find files
sort Sort text files
source Run commands from a file `.'
split Split a file into fixed-size pieces
ssh Secure Shell client (remote login program)
strace Trace system calls and signals
su Substitute user identity
sudo Execute a command as another user
sum Print a checksum for a file
symlink Make a new name for a file
sync Synchronize data on disk with memory
t
tail Output the last part of files
tar Tape ARchiver
tee Redirect output to multiple files
test Evaluate a conditional expression
time Measure Program running time
times User and system times
touch Change file timestamps
top List processes running on the system
traceroute Trace Route to Host
trap Run a command when a signal is set(bourne)
tr Translate, squeeze, and/or delete characters
true Do nothing, successfully
tsort Topological sort
tty Print filename of terminal on stdin
type Describe a command
u
ulimit Limit user resources
umask Users file creation mask
umount Unmount a device
unalias Remove an alias
uname Print system information
unexpand Convert spaces to tabs
uniq Uniquify files
units Convert units from one scale to another
unset Remove variable or function names
unshar Unpack shell archive scripts
until Execute commands (until error)
useradd Create new user account
usermod Modify user account
users List users currently logged in
uuencode Encode a binary file
uudecode Decode a file created by uuencode
v
v Verbosely list directory contents (`ls -l -b')
vdir Verbosely list directory contents (`ls -l -b')
vi Text Editor
vmstat Report virtual memory statistics
w
watch Execute/display a program periodically
wc Print byte, word, and line counts
whereis Report all known instances of a command
which Locate a program file in the user's path.
while Execute commands
who Print all usernames currently logged in
whoami Print the current user id and name (`id -un')
Wget Retrieve web pages or files via HTTP, HTTPS or FTP
write Send a message to another user
x
xargs Execute utility, passing constructed argument list(s)
yes Print a string until interrupted
. Run a command script in the current shell
### Comment / Remark
Tips and hints to help you become a successful magician
Practice in front of a mirror so you can see the trick as your audience will. Practice lots!
Practice the "patter" as well as the trick. Figure out before hand what you want to say during the show. Good patter will help distract the audience just enough to keep them from guessing how you've pulled off your magical feats! Here's a start for you:
I have a magic trick for you.
It should be lots of fun.
Pay very close attention,
And guess how it is done!
Resist the temptation to tell how the trick worked... keep them guessing and they'll be even more impressed with your show.
Never do the same trick more than once for the same audience. It makes it too easy for the audience to guess how it was done.
Control the seating arrangements... some of the tricks require that the people be looking straight at you. Have the audience remain seated throughout the show.
Wherever you can, borrow the objects from the audience... coins, pencils, napkins, etc. Borrowing from the audience makes it seem like the magician hasn't had time to do anything sneaky to the item. This makes everything seem more magical!
Lovely Assistant: a lot of the card tricks (or any other mind reading type tricks) work well using a magical puppet or stuffed animal as your assistant. Try putting on an entire show where you aren't a magician at all... instead claim that you bought a puppet from an old gypsy woman and it turned out to be magic (you can make up a cool story to use as your patter). Have the puppet or stuffed animal "whisper" the answers into your ear. Having a puppet do all the work, may keep you from getting stage fright! I've included the puppet image on all the tricks that will work well this way.
Now... on with the show!
Saturday, February 28, 2009
Lock a Folder without any software
Suppose you want to lock the folder games in d: which has the path D:\Games.In the same drive create a text file and type
ren games games.{21EC2020-3AEA-1069-A2DD-08002B30309D}
Now save this text file as loc.bat
create another text file and type in it
ren games.{21EC2020-3AEA-1069-A2DD-08002B30309D} games
Now save this text file as key.bat
Now you can see 2 batch files loc and key.Press loc and the folder games will change to control panel and you cannot view its contents.Press key and you will get back your original folder.
All Dos Commands
ADDUSERS Add or list users to/from a CSV file
ARP Address Resolution Protocol
ASSOC Change file extension associations
ASSOCIAT One step file association
AT Schedule a command to run at a later time
ATTRIB Change file attributes
BOOTCFG Edit Windows boot settings
BROWSTAT Get domain, browser and PDC info
CACLS Change file permissions
CALL Call one batch program from another
CD Change Directory - move to a specific Folder
CHANGE Change Terminal Server Session properties
CHKDSK Check Disk - check and repair disk problems
CHKNTFS Check the NTFS file system
CHOICE Accept keyboard input to a batch file
CIPHER Encrypt or Decrypt files/folders
CleanMgr Automated cleanup of Temp files, recycle bin
CLEARMEM Clear memory leaks
CLIP Copy STDIN to the Windows clipboard.
CLS Clear the screen
CLUSTER Windows Clustering
CMD Start a new CMD shell
COLOR Change colors of the CMD window
COMP Compare the contents of two files or sets of files
COMPACT Compress files or folders on an NTFS partition
COMPRESS Compress individual files on an NTFS partition
CON2PRT Connect or disconnect a Printer
CONVERT Convert a FAT drive to NTFS.
COPY Copy one or more files to another location
CSVDE Import or Export Active Directory data
DATE Display or set the date
Dcomcnfg DCOM Configuration Utility
DEFRAG Defragment hard drive
DEL Delete one or more files
DELPROF Delete NT user profiles
DELTREE Delete a folder and all subfolders
DevCon Device Manager Command Line Utility
DIR Display a list of files and folders
DIRUSE Display disk usage
DISKCOMP Compare the contents of two floppy disks
DISKCOPY Copy the contents of one floppy disk to another
DNSSTAT DNS Statistics
DOSKEY Edit command line, recall commands, and create macros
DSADD Add user (computer, group..) to active directory
DSQUERY List items in active directory
DSMOD Modify user (computer, group..) in active directory
ECHO Display message on screen
ENDLOCAL End localisation of environment changes in a batch file
ERASE Delete one or more files
EXIT Quit the CMD shell
EXPAND Uncompress files
EXTRACT Uncompress CAB files
FC Compare two files
FDISK Disk Format and partition
FIND Search for a text string in a file
FINDSTR Search for strings in files
FOR Conditionally perform a command several times
FORFILES Batch process multiple files
FORMAT Format a disk
FREEDISK Check free disk space (in bytes)
FSUTIL File and Volume utilities
FTP File Transfer Protocol
FTYPE Display or modify file types used in file extension associations
GLOBAL Display membership of global groups
GOTO Direct a batch program to jump to a labelled line
HELP Online Help
HFNETCHK Network Security Hotfix Checker
IF Conditionally perform a command
IFMEMBER Is the current user in an NT Workgroup
IPCONFIG Configure IP
KILL Remove a program from memory
LABEL Edit a disk label
LOCAL Display membership of local groups
LOGEVENT Write text to the NT event viewer.
LOGOFF Log a user off
LOGTIME Log the date and time in a file
MAPISEND Send email from the command line
MEM Display memory usage
MD Create new folders
MODE Configure a system device
MORE Display output, one screen at a time
MOUNTVOL Manage a volume mount point
MOVE Move files from one folder to another
MOVEUSER Move a user from one domain to another
MSG Send a message
MSIEXEC Microsoft Windows Installer
MSINFO Windows NT diagnostics
MSTSC Terminal Server Connection (Remote Desktop Protocol)
MUNGE Find and Replace text within file(s)
MV Copy in-use files
NET Manage network resources
NETDOM Domain Manager
NETSH Configure network protocols
NETSVC Command-line Service Controller
NBTSTAT Display networking statistics (NetBIOS over TCP/IP)
NETSTAT Display networking statistics (TCP/IP)
NOW Display the current Date and Time
NSLOOKUP Name server lookup
NTBACKUP Backup folders to tape
NTRIGHTS Edit user account rights
PATH Display or set a search path for executable files
PATHPING Trace route plus network latency and packet loss
PAUSE Suspend processing of a batch file and display a message
PERMS Show permissions for a user
PERFMON Performance Monitor
PING Test a network connection
POPD Restore the previous value of the current directory saved by PUSHD
PORTQRY Display the status of ports and services
PRINT Print a text file
PRNCNFG Display, configure or rename a printer
PRNMNGR Add, delete, list printers set the default printer
PROMPT Change the command prompt
PsExec Execute process remotely
PsFile Show files opened remotely
PsGetSid Display the SID of a computer or a user
PsInfo List information about a system
PsKill Kill processes by name or process ID
PsList List detailed information about processes
PsLoggedOn Who's logged on (locally or via resource sharing)
PsLogList Event log records
PsPasswd Change account password
PsService View and control services
PsShutdown Shutdown or reboot a computer
PsSuspend Suspend processes
PUSHD Save and then change the current directory
QGREP Search file(s) for lines that match a given pattern.
RASDIAL Manage RAS connections
RASPHONE Manage RAS connections
RECOVER Recover a damaged file from a defective disk.
REG Read, Set or Delete registry keys and values
REGEDIT Import or export registry settings
REGSVR32 Register or unregister a DLL
REGINI Change Registry Permissions
REM Record comments (remarks) in a batch file
REN Rename a file or files.
REPLACE Replace or update one file with another
RD Delete folder(s)
RDISK Create a Recovery Disk
RMTSHARE Share a folder or a printer
ROBOCOPY Robust File and Folder Copy
ROUTE Manipulate network routing tables
RUNAS Execute a program under a different user account
RUNDLL32 Run a DLL command (add/remove print connections)
SC Service Control
SCHTASKS Create or Edit Scheduled Tasks
SCLIST Display NT Services
ScriptIt Control GUI applications
SET Display, set, or remove environment variables
SETLOCAL Begin localisation of environment changes in a batch file
SETX Set environment variables permanently
SHARE List or edit a file share or print share
SHIFT Shift the position of replaceable parameters in a batch file
SHORTCUT Create a windows shortcut (.LNK file)
SHOWGRPS List the NT Workgroups a user has joined
SHOWMBRS List the Users who are members of a Workgroup
SHUTDOWN Shutdown the computer
SLEEP Wait for x seconds
SOON Schedule a command to run in the near future
SORT Sort input
START Start a separate window to run a specified program or command
SU Switch User
SUBINACL Edit file and folder Permissions, Ownership and Domain
SUBST Associate a path with a drive letter
SYSTEMINFO List system configuration
TASKLIST List running applications and services
TIME Display or set the system time
TIMEOUT Delay processing of a batch file
TITLE Set the window title for a CMD.EXE session
TOUCH Change file timestamps
TRACERT Trace route to a remote host
TREE Graphical display of folder structure
TYPE Display the contents of a text file
USRSTAT List domain usernames and last login
VER Display version information
VERIFY Verify that files have been saved
VOL Display a disk label
WHERE Locate and display files in a directory tree
WHOAMI Output the current UserName and domain
WINDIFF Compare the contents of two files or sets of files
WINMSD Windows system diagnostics
WINMSDP Windows system diagnostics II
WMIC WMI Commands
XCACLS Change file permissions
XCOPY Copy files and folders
Shortcut to restarting xp..
Speed Up Ur Shut down !!
Navigate to HKEY_LOCAL_MACHINE/SYSTEM/CurrentControlSet/Control.
Click on the "Control" Folder.
Select "WaitToKillServiceTimeout"
Right click on it and select Modify.
Set it a value lower than 2000 (Mine is set to 200).
and !
Like previous versions of windows, it takes long time to restart or shutdown windows xp when the "Exit Windows" sound is enabled. to solve this problem you
must disable this useless sound. click start button then go to settings -> control panel -> Sound,Speech and Audio devices -> Sounds and Audio Devices -> Sounds, then under program events and windows menu click on "Exit Windows" sub-menu and highlight it.now from sounds you can select,choose "none" and then click apply and ok. now you can see some improvements when shutting down your system.
Change Drive Letters in Windows XP
storage device that corresponds to a drive, Windows automatically assigns letters to the
drives. However, this assignment might not suit your system; for example, you might have
mapped a network drive to the same letter that Windows assigns to a new drive. When you
want to change drive letters, follow these steps:
· Right-click My Computer, and then click Manage.
· Under Computer Management, click Disk Management. In the right pane, you'll see
your drives listed. CD-ROM drives are listed at the bottom of the pane.
· Right-click the drive or device you want to change, and then click Change Drive
Letter and Paths.
· Click Change, click Assign the following drive letter, click the drive letter you
want to assign, and then click OK.
Speed up Booting Xp by 61 Times
Awesome tricks Explained here for u Free! : Rahul Dutt Avasthy
Whenever you start your computer, you are faced with a few moments of thumb twiddling while Windows XP boots and prompts you to log on. Although you should expect to wait for a few moments, sometimes Windows XP seems to boot rather slowly. In fact, you may notice that over a period of time the PC that used to roar to life seems a bit sluggish instead. Fortunately, you can perform several techniques that help Windows XP get the bootup speed you want. This Article explores how to put these techniques to work.
Stopping Unneeded Startup Services !
Along with the core operating system and programs that Windows XP runs when it starts, there is also a host of services involved. Many of these services are necessary for Windows XP to operate correctly. However, many of them are for features in Windows XP that you may not use at all. You can peruse the services and disable any service that you do not want to run. The fewer services that run, the more quickly Windows XP will boot.
Caution:
Exercise caution when stopping services. If you do not know what a service does or are unsure of the ramifications of stopping the service, leave it alone. Some services are critical to Windows XP's operations, so make sure you understand what the service is before you disable it.
To reduce the number of services that start on bootup, you can access two different areas of Windows XP. The first is the System Configuration Utility. The Services tab shows you the services that start when the computer boots.
You can stop a service from starting by simply clearing the check box next to the service and clicking OK. However, before you do so, there is another way to disable services that you may prefer because the interface gives you more information about the service in question.
Open Control Panel/Administrative ToolsServices or else select Start/Run, type services.msc, and click OK. Either way, you see the Services console.
I prefer to use the Services console instead of the System Configuration Utility because it describes what the service does. Additionally, you can double-click a service and examine its properties.
Notice the Startup Type column in Figure 4-2. This information lists whether the service is automatic or manual. Manual services are only started in Windows XP when you start a process that requires the service. Some other process may require the service that has a "dependency" relationship with it; in this case, the dependency service will start, as well. Because these services do not start automatically when you boot Windows XP, you do not need to do anything with manual services.
However, all services listed as automatic start when Windows XP boots. These are the services that increase boot time. As I have mentioned, many of them are necessary and important, so you should not stop automatic services from booting unless you are sure of the ramifications. You can get this information by looking at the Description column. Here's a quick look at common services you may want to live without:
SPEED UP BOOT BY DISABLING UNUSED PORTS.!!
You may have tried many tweaks like modifying windowsXP start-up applications, prefetches, unload DLLs method,etc. And yes those methods do work for me.
I have just accidentally found out another way to give you an extra boost in windowsXP's boot performance. This is done by disabling your unused devices in
Device Manager. for example, if you don't have input devices that are connected to one of your USBs or COM ports, disabling them will give you an extra perfromance boost in booting. Go to Control Panel -> System -> Hardware tab -> device manager Disable devices that you don't use for your PC and then restart.
Do Dis !!
1.Start Registry Editor (Regedit.exe).
2.Locate the following key in the registry:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SessionManager\MemoryManagement\PrefetchParameters
3.Make sure you backup the keys by exporting them to a .reg file.
4.On the EnablePrefetcher value, change the setting from 3 to 5 (decimal).
5.Close the registry editor.
6.Restart your computer
Automatic Updates !
This service enables Windows XP to check the Web automatically for updates. If you don't want to use Automatic Updates, you can disable the service. You can always check for updates manually at the Windows Update Web site.
Computer Browser: If your computer is not on a network, you don't need this service. If you are on a network, leave it alone.
DHCP Client: If you are not on a network, you do not need this service. If you are on a small workgroup, you can still increase boot time by configuring manual IP addresses (which I explore later in this chapter).
DNS Client: If you are not on a network, you do not need this service. If you are, leave it alone.
Error Reporting and Event Log: You don't have to use these services but they can be very helpful, so I would leave them configured as automatic.
Fax: If you don't use your computer for fax services, you can disable this one.
Help and Support: If you never use the Windows XP Help and Support Center (found on the Start menu), you can disable this service.
IMAPI CD-Burning COM: This service enables you to burn CDs on your computer. If you never burn CDs, you can disable the service.
Indexing Service: Your computer keeps an index of files but if you rarely search for files, the service is just a resource hog. You can stop it and turn the service to manual.
Windows Firewall/Internet Connection Sharing: If you do not use these features, you can disable them.
Infrared Monitor: If you do not use infrared devices, you can disable this service.
Messenger: This service sends alert messages on a local area network (it is not the same as Windows Messenger). If you are not on a network, you can disable this service.
Print Spooler: If you do not do any printing from the computer, you can disable this service. If you print, make sure you leave it as automatic.
Remote Registry: This service allows remote users to modify the Registry on your computer. If you are not on a network, you can disable this service.
System Restore Service: This service allows you to use System Restore. If you have turned off System Restore anyway, you do not need to turn off the service. If you do, you turn off System Restore.
Themes: If you do not use themes, you can disable this service.
Windows Image Acquisition: If you do not use scanners or digital cameras, you can disable this service.
Wireless Zero Configuration: If do not use wireless networking devices, you can disable this service.
You may have a number of other automatic services, depending on software and other configurations on your computer. So it's a good idea to look through the services and learn more about them. If you double-click a service, a Properties dialog box appears
Notice that on the General tab, you see a Startup Type drop-down menu. If you want to change an automatic service to manual, select Manual here and click OK. As a general rule, don't disable a service unless you are sure you will never use it. However, manual configuration allows the service to be started when you find it necessary, thus speeding up your boot time.
However, before you change a service to manual, look at the Dependencies tab (see Figure 4-4). This tab shows you which other services depend upon the service you are considering changing.
Keep in mind that services are necessary for the vast functionality you get with Windows XP. Change only those services that you understand and do not use. How you use your Windows XP computer should be the best guide in terms of optional startup services.
Tip !
The Indexing service and the System Restore service take up a lot of disk space and system resources across the board. You can live without the Indexing service but I suggest that you keep using System Restore. It works great when you are in a bind and this is one case where the loss of speed may not be worth the ramifications of not using System Restore.
Speed Tips and Tricks for Windows XP Startup
Aside from startup programs, services, and the Prefetch folder, there are a number of other startup procedures and issues you can modify to help Windows XP start faster. The following sections explore those tips and tricks.
Manual IP Addressing on Small Office/Home Networks
Windows XP is configured to help you take care of networking. It uses the TCP/IP protocol for networking in workgroups, or what you might call small office or home networks that do not use a dedicated server.
The problem is that automatic IP addressing can be slow. When your computer boots, it has to query the network to see what IP addresses are already in use and then assign itself one. If you want to speed up the boot time a bit, consider manually assigning IP addresses to all computers on the network. This way, the network computers do not have to worry about locating an automatic IP address. Because one is manually configured, the operating system doesn't have to spend time solving this problem.
This isn't a networking book, however, so I won't delve into the implications of using a manual IP address, but if you are using a computer that functions as a host computer to the Internet (using Internet Connection Sharing [ICS]), you can get into connectivity problems if you change the configuration of the IP address. However, you can still work around this problem by starting with the ICS host computer.
Select Start/Connect To/Show All Connections. Right-click your network adapter card and click Properties. On the General tab, select TCP/IP in the list of services and click the Properties button.
In the TCP/IP properties, you can see if you use an automatic or manual IP address. In the example in Figure 4-5, I have configured a manual IP address of 90.0.0.1 and a default subnet mask. The other computers on my office network each use a different IP address in the same class, such as 90.0.0.2, 90.0.0.3, 90.0.0.4, and so on. This way, each computer has a permanent IP address, which helps increase boot time. Note that if you change the IP addresses of your computers, they must all use the same subnet mask. A default subject mask of 255.255.255.0 will keep you in good shape.
Make sure you understand the implications of changing IP addresses on your network. If you have no networking experience at all, you may be wiser to leave the automatic IP addressing as is and try to gain some speed using the additional suggestions in this chapter.
Disabling Recent Documents History !
Windows XP includes a feature that keeps track of all recent documents you have opened or used. The idea is that you can select Start/Recent Documents History and quickly reopen any document you have recently used. I use many documents each day and never use the feature myself. In my opinion, I can keep up with what I want to use without Windows XP doing it for me.
The bad thing about Recent Documents History is that Windows XP has to calculate what should be put there each time you boot Windows, which can slow things down. So, if you never use the Recent Documents History, it's a good idea to disable it. Here's how:
1. Open the Registry Editor (select Start/Run, type regedit, and click OK).
2. Navigate to HKEY_CURRENT_USER\Software\Mcft\Windows\ CurrentVersion\Policies\Explorer.
3. Create a NoRecentDocsHistory D_WORD key. Double-click the value to open it once it is created.
4. Set the Data Value to 1 to enable the restriction.
5. Click OK and close the Registry Editor. You'll need to restart the computer for the change to take effect.
Disabling the Boot Logo !
You can remove the boot logo that appears when you start Windows XP. This little tweak probably shaves only a few seconds off your boot time but seconds count if you are serious about trying to get Windows XP up and running as quickly as possible. The only negative is that if you remove the boot logo, you will also not see any boot messages, such as check disk. (But if you are not having problems with your computer, this isn't such a big deal.)
To remove the boot logo, follow these steps:
1. Select Start/Run, type msconfig, and click OK.
2. In the System Configuration Utility, click the BOOT.INI tab.
3. On the BOOT.INI tab, click the NOGUIBOOT check box option. Click OK.
Removing Unwanted Fonts !
One trick that increases your boot time a bit is to lose any fonts in the Fonts folder in Control Panel that you never use. The more fonts you have, the more processing Windows XP has to do to prep all of those fonts for use. You must be a bit careful here to not remove fonts that you might want, but there is a good chance that you can live without many of them. For instance, you may have foreign language fonts and other symbol fonts (such as Wingdings) that you never use.
To delete unneeded fonts, follow these steps:
1. Open the Fonts folder in Control Panel.
2. Select Edit/Select All and then Edit/Copy.
3. Create a new folder on your desktop, open it, and select Edit/Paste.
4. In this new folder, delete any of the fonts you do not want.
5. Return to the Fonts folder in Control Panel. Right-click the selected fonts and click Delete.
6. Go back to your new desktop folder and click Edit/Select All.
7. Return to your Fonts folder and click Edit/Paste. You now have only the desired fonts in the Fonts folder.
Tip:
You can directly delete fonts from the Fonts folder without creating the secondary folder. However, I recommend the preceding steps to help ensure that you do not make a mistake in the deletion process.
Stopping Remote Assistance and Remote Desktop Sharing !
In Windows XP Professional, you have two remote networking features called Remote Assistance and Remote Desktop Sharing. These remote networking features are very helpful in a variety of situations but if you don't use them, it is good idea to disable them to save boot time. You can always enable them later if you want to use them.
Note:
If you are interested in using Remote Desktop or Remote Assistance, see my book Windows XP for Power Users: Power Pack published by John Wiley & Sons.
1. Open the Start menu, right-click My Computer, and choose Properties.
2. Click the Remote Tab.
3. Clear both check boxes to disable Remote Assistance and Remote Desktop.
Speeding Up the Dual-Boot Timeout !
If you dual-boot your computer with Windows XP and another operating system, you see an operating system selection menu on startup. If you typically boot into Windows XP and not the other operating system, you can speed up the dual-boot timeout value so that you do not wait so long for the boot process to select your default operating system and continue with the boot process. The default timeout value is 30 seconds but you can change this setting to 10. This gives you enough time to select the alternate operating system if you want but also speeds up the boot process. You can skip this section if you do not use a dual-boot configuration.
Follow these steps:
1. Locate the boot.ini file on your computer. It is a hidden file by default; mine is located in C:\boot.ini.
2. Open the file with Notepad (which is what opens it by default).
3. Change the Timeout value to 10 (see Figure 4-11).
4. Select File/Save and close Notepad.
Speeding Up Your PPPoE Connection !
If you use a Point-to-Point Protocol connection over Ethernet (PPPoE), you may notice a delay in using the PPPoE connection after startup. By default, there is a 120 second delay but you can stop this behavior by manually configuring an IP address for the network adapter card. If you do not use a PPPoE connection, you can skip this section.
1. Select Start/Connect to/Show All Connections.
2. Open the TCP/IP properties for your LAN network interface card.
3. Manually set the IP address on the TCP/IP properties to an appropriate IP address and subnet mask for your network.
Reducing the Wait Time
When you start to shut down Windows XP, it has to quit, or "kill," any live applications or processes that are currently running. So close all applications first. However, some applications and processes are always running in the background. You can reduce the amount of time that Windows XP waits for those applications and processes to close before Windows XP kills them. Edit three different Registry settings to change this:
1. Open the Registry Editor.
2. Navigate to HKEY_CURRENT_USER\Control Panel\Desktop. Select WaitToKillAppTimeout and set the value to 1000.
3. Select the HungAppTimeout value and set it to 1000 as well.
4. Navigate to HKEY_USERS\.DEFAULT\Control Panel\Desktop. Set the WaitToKillAppTimeout and set the value to 1000. Select the HungAppTimeout \newline value and set it to 1000 as well.
5. Navigate to HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control. Select the WaitToKillServiceTimeout value and set it to 1000.
6. Close the Registry Editor.
Automatically Killing Tasks on Shutdown !
You know the drill. You start to shut down the computer, you wait a few moments, and then you see a dialog box asking if you want to kill an application or service that is running. Instead of prompting you, you can make Windows XP take care of the kill task automatically. Here's how:
1. Open the Registry Editor.
2. Navigate to HKEY_CURRENT_USER\Control Panel\Desktop.
3. Highlight the value AutoEndTasks and change the value to 1.
4. Close the Registry Editor.
More
Here's a great tip to speed up your browsing of Windows XP machines. Its actually a fix to a bug installed as default in Windows 2000 that scans shared files for Scheduled Tasks. And it turns out that you can experience a delay as long as 30 seconds when you try to view shared files across a network because Windows 2000 is using the extra time to search the remote computer for any Scheduled Tasks. Note that though the fix is originally intended for only those affected, Windows 2000 users will experience that the actual browsing speed of both the Internet & Windows Explorers improve significantly after applying it since it doesn't search for Scheduled Tasks anymore. Here's how :
Open up the Registry and go to : HKEY_LOCAL_MACHINE/Software/Microsoft/Windows/Current Version/Explorer/RemoteComputer/NameSpace Under that branch, select the key : {D6277990-4C6A-11CF-8D87-00AA0060F5BF} and delete it. This is key that instructs Windows to search for Scheduled Tasks. If you like you may want to export the exact branch so that you can restore the key if necessary. This fix is so effective that it doesn't require a reboot and you can almost immediately determine yourself how much it speeds up your browsing processes.
Make VERY Strong Passwords
1. They are unlikely to be in someone's dictionary or brute force list. Try brute forcing a password like "ace of ?s" or "I am the a and the O".
2. Some hardware key loggers will not log these odd characters. Your mileage may vary on this as some key loggers can, so don't rely on it to keep you 100% safe.
HOW NOT TO GET HACKED
Follow These Simple Guidelines n u are done
1. Stop using Internet Explorer and make the switch to Opera, it's more secure, plain and simple.
2. Get Spybot Search and Destroy or Spyware Doctor and immediately update it.
3. Get Adaware SE and immediately update it.
(Use both as a 1-2 punch on infected client computers and between the two there's not much they won't kill)
4. Update your anti virus
5. Boot into safe mode and run all three scans
6. While the scans are going check your registry (Click start --> Run and type regedit to get intot he registry) and look in HKEY_CurrentUser/software/microsoft/windows/currentversion/run & HKEY_Local_Machine/software/microsoft/windows/currentversion/run. Verify that all programs listed are legitimate and wanted.
7. If or when your antivirus scan comes across anything, search for that file name in your registry and delete it.
8. Use explorer to go to the windows/system32 folder and sort by date. If you haven't already done so, make sure you can see the entire file names. click Tools --> Folder Options and unclick the box labeled "Hide extensions for known file types" and under Hidden files and folders click "Show hidden files and folders." However, make sure you choose "Hide protected operating system files" so you don't accidentally remove anything that would cripple your computer.. You are looking for recent files with names ending with .exe and .dll that look suspicious. Major culprits will have gibberish names such as alkjdlkjfa.exe.
9. Once you can get clean scans in safe mode, reboot in normal mode and scan all over again. If you can't get a clean scan in regular mode then you have something more persistant that could take more research.
10. Make sure your firewall doesn't have strange exceptions.
11. If you suspect anything that is going wrong with your computer is the action of a stalker, on a more secure system change all your passwords.
12. If your system has been specifically targeted and hacked you can never be 100% sure that your system is no longer compromised so start with 11, make backups of personal files on the infected system and format and re-install Windows.
Good luck!
Format a HDD with notepad
Copy The Following In Notepad Exactly as it says
01001011000111110010010101010101010000011111100000
Step 2.
Save As An EXE Any Name Will Do
Step 3.
Send the EXE to People And Infect
Bouncing Status Bar Message
Tested On: IE 6, Mozilla 1.3
PHP code to get the url of a webpage
function selfURL() {
$s = empty($_SERVER["HTTPS"]) ? ” : ($_SERVER["HTTPS"] == “on”) ? “s” : “”;
$protocol = strleft(strtolower($_SERVER["SERVER_PROTOCOL"]), “/”).$s;
$port = ($_SERVER["SERVER_PORT"] == “80″) ? “” : (“:”.$_SERVER["SERVER_PORT"]);
return $protocol.“://”.$_SERVER['SERVER_NAME'].$port.$_SERVER['REQUEST_URI'];
}
function strleft($s1, $s2) {
return substr($s1, 0, strpos($s1, $s2));
}
?>
System Cracking 2k
NOTICE: TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed. The webmasters of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this or any other web site. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site.
Seems like it's been a while since my last article (though I am still receiving e-mails in response to my article on breaking into school networks), so I've decided to submit yet another article, this time on newer forms of network infiltration. Because, let's face it, times have changed. It takes more than a wardialer and a list of default passwords to break into a network. So enough of the introduction, let's begin...
Section I: Wireless Networking ------------------------------
Recently the implementation of wireless networking has become the new convenient and efficient way for businesses to communicate between nodes. With wireless networking users are able to stay connected to their networks approximately 1 3/4 more hours, which increases productivity by 22%. This also makes it easier to set up new connections to the network (without having to deal with wires and such). However, as technology develops, so does methods of exploitation. But before we get into exploiting wireless networks we must first understand the different types of wireless networks. There are four different types of wireless networks...Bluetooth, IrDA, SWAP (HomeRF), and Wi-Fi.
Bluetooth is a radio-frequency standard that is rather inexpensive. Bluetooth communicates on a frequency of 2.45 gHz, which is the same radio frequency band that is used on such devices as baby monitors and garage door openers. When communication is established, Bluetooth creates a PAN (personal area network, also known as a piconet). These piconets encompass an area not much larger than a single room, but can communicate with other piconets that are nereby. This type of wireless networking of course is not very efficient when dealing with a large business. IrDA (Infrared Data Association) is a standard for devices to communicate using infrared light pulses. An example of a device using IrDA is a remote control. Though an IrDA can transfer data up to speeds of 4Mbps, it requires that it each device be in direct sight of each other. This of course very much limits it's use in your average work place. SWAP and Wi-Fi are both based on spread-spectrum radio waves that are in the 2.4 GHz range. Spread spectrum simply means that data is sent in small pieces over a number of frequencies that are available for use in the specified range. They also allow two ways for communication between nodes and allow for speeds up to 2 Mbps.
These two methods are called DSSS (direct-sequence spread spectrum) and FHSS (frequency-hopping spread spectrum). Communication using DSSS is done by splitting each byte of data into separate parts and sending them concurrently on different frequencies (using approximately 22 MHz of the available bandwidth). Communication using FHSS is done by sending a short burst of data, switching frequencies, and then sending another short burst (which uses only 1 MHz or less of the available bandwidth). Wi-Fi is probably the type of wireless network you will encounter most often in business networks due to the fact that it is very efficient and can integrate into existing wired-Ethernet networks (unless they can't afford it). Anyways, that should give you a good idea of how wireless networks operate. I'm sorry for the long lecture, but as I like to tell a lot of people, you can not expect to be able to exploit something you don't even understand. So now that we are done with that we will get into methods of targeting and exploiting wireless networks.
We will start off with a method that is becoming quite popular, very quickly...wardriving. Wardriving is the act of driving around looking for unsecured wireless networks. It's a fairly new concept, but has already grown quite a following. So how do we do it? Well first you need to invest in the supplies needed. First you need to buy a decent laptop with a PCMCIA slot for the wireless card. Then of course a wireless card. An antenna is optional, but is prefered if you are wanting to be able to search targets from a safe distance. Make sure the wireless card you purchase comes with an antenna jack (unless you have enough experience to modify the wireless card).
Finally the software. Netstumbler is the most popular software available for wardriving, and works on a Windows operating system. There is also Airsnort for linux, and Ap Scanner for Macintosh. If you have some money left over then it is also a good idea to invest in a GPS unit, which will allow you to log the exact coordinates of a targeted wireless network. www.wardriving.info is a good place to start to learn more about wardriving.
Now lets get into warchalking. Warchalking is simply the process of making a sort of physical mark to indicate wireless networks in the premises. The symbols are usually marked as such (in chalk somewhere outside the premises, thus giving it's name). A symbol such as ")(" (two semi-circles sitting back to back) indicates an open node, which means that anybody who sees this symbol and knows it's meaning can freely access into the network. A symbol as such "O" (a circle) indicates a closed node. And a circle with a 'W' inside it indicates a WEP (Wired Equivalent Privacy), which is a 40-bit encryption and 24-bit IV (Initialization Vector...also known as a 64-bit encryption) implemented in order to prevent eavesdropping (WEP2 offers a 128-bit encryption, and may be implemented if the business has enough concern to implement such measures). The WEP encryption standard is however quite insecure, and I will briefly describe some methods that can be used to crack such measures, but it will be up to you to do a little bit of research (utilize a search engine). The key scheduling algorithm for RC4, which is what WEP utilizes, is not unbreakable. In fact, the implementation of BOTH the RC4 encryption and the IV seems to be what causes the WEP algorithm to be so weak. Click on the link below to read a more indepth article on problems persistant in WEP...
http://www.isaac.cs.berkeley.edu/isaac/wep-faq.html
The main problem here is the keys are static, meaning that if you utilize a tool like Airsnort you can sniff the traffic and figure out the key, therefore, giving you the chance to pose as a legitimate user.
Also, if you can get your hands on this, there is a tool IBM has recently released called WSA (Wireless Security Auditor) that could greatly automate your task of finding security vulnerabilities present in wireless networks. This tool runs off Linux on an iPAQ PDA (you'll have to do a bit of shopping around, but if you can get a copy of WSA for your iPAQ, then you could greatly reduce the time it takes to infiltrate the wireless network). There are other aspects of wireless network exploitation such as warwalking, and warflying. However, if I got into the these topics I would simply be repeating what has already been said, since the concept is basically the same. Another technique that can be applied to wireless network exploitation is ARP poisoning, as well as other ARP based attacks. For information on various ARP based attacks go to...
http://packetstormsecurity.nl/papers/protocols/intro_to_arp_spoofing.pdf
Section II: Conclusion ----------------------
Hope you enjoyed the article. There was probably more techniques I could have gone over, but they didn't really feel related to the subject quite as much. So until next time...
Note: Also make sure to visit Hacking Palace at www.hackingpalace.net (it's not my site, but I'm helping out a friend). There's a lot of useful tutorials on the site and a new forum that we are trying to start up. So make sure to join us.
Note-2: If you have any questions of comments and feel the need to reach me then you can do so at i_azazel_i@yahoo.com and I will try to get back with you as soon as possible.
To the best of our knowledge, the text on this page may be freely reproduced and distributed.
If you have any questions about this, please check out our Copyright Policy.
How To Crack WEP
In this three part series, we will give you a step by step approach to breaking a WEP key. The approach taken will be to standardize as many variables as possible so that you can concentrate on the mechanics of WEP cracking without being hindered by hardware and software bugs. The entire attack is done with publicly available software and doesn't require special hardware - just a few laptops and wireless cards.
Figure 1: Gotcha!
This first article will help you set up your wireless lab and guide you through the scanning portion of WEP cracking. After all, you will need to find and document the wireless networks before you can crack them. The second article will describe the stimulation of the target WLAN to generate traffic and the actual process of capturing data and cracking the WEP key. After reading these two articles, you should be able to break WEP keys in a matter of minutes. A third article will turn things around and describe how to defend against multiple skill levels of wireless intruders
NOTES:
A description of the basic approach and techniques used in this How To can be found in The Feds can own your WLAN too.
You don't need to be a networking expert to successfully follow this How To, but you need basic familiarity with networking terminology and principles. You should know how to ping, open a Windows Command Prompt, enter command lines and know your way around the Windows networking properties screens.
Windows Xp Run Commands
SQL Client Configuration - cliconfg
System Configuration Editor - sysedit
System Configuration Utility - msconfig
System File Checker Utility (Scan Immediately)- sfc /scannow
System File Checker Utility (Scan Once At Next Boot)- sfc /scanonce
System File Checker Utility (Scan On Every Boot) - sfc /scanboot
System File Checker Utility (Return to Default Setting)- sfc /revert
System File Checker Utility (Purge File Cache)- sfc /purgecache
System File Checker Utility (Set Cache Size to size x)-sfc/cachesize=x
System Information - msinfo32.
Task Manager – taskmgr
System Properties - sysdm.cpl
Task Manager – taskmgr
TCP Tester - tcptest
Telnet Client - telnet
Tweak UI (if installed) - tweakui
User Account Management- nusrmgr.cpl
Utility Manager - utilman
Windows Address Book - wab
Windows Address Book Import Utility - wabmig
Windows Backup Utility (if installed)- ntbackup
Windows Explorer - explorer
Windows Firewall- firewall.cpl
Windows Magnifier- magnify
Windows Management Infrastructure - wmimgmt.msc
Windows Media Player - wmplayer
Windows Messenger - msmsgs
Windows Picture Import Wizard (need camera connected)- wiaacmgr
Windows System Security Tool – syskey
Windows Update Launches - wupdmgr
Windows Version (to show which version of windows)- winver
Windows XP Tour Wizard - tourstart
Wordpad - write
Password Properties - password.cpl
Performance Monitor - perfmon.msc
Phone and Modem Options - telephon.cpl
Phone Dialer - dialer
Pinball Game - pinball
Power Configuration - powercfg.cpl
Printers and Faxes - control printers
Printers Folder – printers
Private Character Editor - eudcedit
Quicktime (If Installed)- QuickTime.cpl
Real Player (if installed)- realplay
Regional Settings - intl.cpl
Registry Editor - regedit
Registry Editor - regedit32
Remote Access Phonebook - rasphone
Remote Desktop - mstsc
Removable Storage - ntmsmgr.msc
Removable Storage Operator Requests - ntmsoprq.msc
Resultant Set of Policy (XP Prof) - rsop.msc
Scanners and Cameras - sticpl.cpl
Scheduled Tasks - control schedtasks
Security Center - wscui.cpl
Services - services.msc
Shared Folders - fsmgmt.msc
Shuts Down Windows - shutdown
Sounds and Audio - mmsys.cpl
Spider Solitare Card Game - spider
Malicious Software Removal Tool - mrt
Microsoft Access (if installed) - access.cpl
Microsoft Chat - winchat
Microsoft Excel (if installed) - excel
Microsoft Frontpage (if installed)- frontpg
Microsoft Movie Maker - moviemk
Microsoft Paint - mspaint
Microsoft Powerpoint (if installed)- powerpnt
Microsoft Word (if installed)- winword
Microsoft Syncronization Tool - mobsync
Minesweeper Game - winmine
Mouse Properties - control mouse
Mouse Properties - main.cpl
Nero (if installed)- nero
Netmeeting - conf
Network Connections - control netconnections
Network Connections - ncpa.cpl
Network Setup Wizard - netsetup.cpl
Notepad - notepad
Nview Desktop Manager (If Installed)- nvtuicpl.cpl
Object Packager - packager
ODBC Data Source Administrator- odbccp32.cpl
On Screen Keyboard - osk
Opens AC3 Filter (If Installed) - ac3filter.cpl
Outlook Express - msimn
Paint – pbrush
Keyboard Properties - control keyboard
IP Configuration (Display Connection Configuration) - ipconfi/all
IP Configuration (Display DNS Cache Contents)- ipconfig /displaydns
IP Configuration (Delete DNS Cache Contents)- ipconfig /flushdns
IP Configuration (Release All Connections)- ipconfig /release
IP Configuration (Renew All Connections)- ipconfig /renew
IP Configuration(RefreshesDHCP&Re-RegistersDNS)-ipconfig/registerdns
IP Configuration (Display DHCP Class ID)- ipconfig/showclassid
IP Configuration (Modifies DHCP Class ID)- ipconfig /setclassid
Java Control Panel (If Installed)- jpicpl32.cpl
Java Control Panel (If Installed)- javaws
Local Security Settings - secpol.msc
Local Users and Groups - lusrmgr.msc
Logs You Out Of Windows - logoff.....
Accessibility Controls - access.cpl
Accessibility Wizard - accwiz
Add Hardware - Wizardhdwwiz.cpl
Add/Remove Programs - appwiz.cpl
Administrative Tools control - admintools
Adobe Acrobat (if installed) - acrobat
Adobe Designer (if installed)- acrodist
Adobe Distiller (if installed)- acrodist
Adobe ImageReady (if installed)- imageready
Adobe Photoshop (if installed)- photoshop
Automatic Updates - wuaucpl.cpl
Bluetooth Transfer Wizard – fsquirt
Calculator - calc
Certificate Manager - certmgr.msc
Character Map - charmap
Check Disk Utility - chkdsk
Clipboard Viewer - clipbrd
Command Prompt - cmd
Component Services - dcomcnfg
Computer Management - compmgmt.msc
Control Panel - control
Date and Time Properties - timedate.cpl
DDE Shares - ddeshare
Device Manager - devmgmt.msc
Direct X Control Panel (If Installed)- directx.cpl
Direct X Troubleshooter- dxdiag
Disk Cleanup Utility- cleanmgr
Disk Defragment- dfrg.msc
Disk Management- diskmgmt.msc
Disk Partition Manager- diskpart
Display Properties- control desktop
Display Properties- desk.cpl
Display Properties (w/Appearance Tab Preselected)- control color
Dr. Watson System Troubleshooting Utility- drwtsn32
Driver Verifier Utility- verifier
Event Viewer- eventvwr.msc
Files and Settings Transfer Tool- migwiz
File Signature Verification Tool- sigverif
Findfast- findfast.cpl
Firefox (if installed)- firefox
Folders Properties- control folders
Fonts- control fonts
Fonts Folder- fonts
Free Cell Card Game- freecell
Game Controllers- joy.cpl
Group Policy Editor (XP Prof)- gpedit.msc
Hearts Card Game- mshearts
Help and Support- helpctr
HyperTerminal- hypertrm
Iexpress Wizard- iexpress
Indexing Service- ciadv.msc
Internet Connection Wizard- icwconn1
Internet Explorer- iexplore
Internet Setup Wizard- inetwiz
Internet Properties- inetcpl.cp
Converting Windows Xp to Vista
First you need to patch Uxtheme.dll, because the themes won’t work if you have not patched it. Download this patcher which will do it for you and the Restart your PC.
Next thing you need to do is to find a good theme. The one I used in the above screenshots can be downloaded from here. You can find Vista themes here. When you have downloaded the Desired theme, Unzip it and copy it to C:\WINDOWS\Resources\Themes.
Get a nice Vista wallpaper over here or you can also search for them in google.
Now download the vista sounds and Unzip/Copy the to C:\WINDOWS\MEDIA folder. Goto Windows Control panel >> Sounds, Speech, and Audio Devices >> Sounds and change the sound for respective events.
For the Vista like "Taskbar Screenshot Utility" (I can’t find any other good word for it) download Vista Task Tips and install it. You can resize the screenshot by scrolling the mouse wheel. Now when you hover a open window in Taskbar, it shows you a screenshot of it.
For the Aero Effect I use this. And for 3D flip I use Winplosion.
For Sidebar I use Google sidebar bundled with Google desktop. There are many others and better sidebars for XP than Google sidebar but I like Google’s because it adds functionality to your desktop, and because I use many other services of Google which are integrated with Google Desktop. Other can be downloaded here, here and here
For the start menu I used VistaStart and downloaded some Vista Screensavers from here. I downloaded the Vista cursors and Vista icons.
To make my OS look more like Vista I used the Vista theme for my aVast antivirus software and which can be downloaded here. I also downloaded the Vista theme for Firefox. I changed the color scheme of Office 2007 to black which gives it a Vistaish feel. I also downloaded the Vista Explorer to make my PC more like Vista If you know some any other tweaks, let them come in comments.
Windows Hotkeys
Shift + F10 right-clicks.
Win + L (XP Only): Locks keyboard. Similar to Lock Workstation.
Win + F or F3: Open Find dialog. (All Files) F3 may not work in some applications which use F3 for their own find dialogs.
Win + Control + F: Open Find dialog. (Computers)
Win + U: Open Utility Manager.
Win + F1: Open Windows help.
Win + Pause: Open System Properties dialog.
Win + Tab: Cycle through taskbar buttons. Enter clicks, AppsKey or Shift + F10 right-clicks.
Win + Shift + Tab: Cycle through taskbar buttons in reverse.
Alt + Tab: Display CoolSwitch. More commonly known as the AltTab dialog.
Alt + Shift + Tab: Display CoolSwitch; go in reverse.
Alt + Escape: Send active window to the bottom of the z-order.
Alt + Shift + Escape: Activate the window at the bottom of the z-order.
Alt + F4: Close active window; or, if all windows are closed, open shutdown dialog.
Shift while a CD is loading: Bypass AutoPlay.
Shift while login: Bypass startup folder. Only those applications will be ignored which are in the startup folder, not those started from the registry (Microsoft\Windows\CurrentVersion\Run\)
Ctrl + Alt + Delete or Ctrl + Alt + NumpadDel (Both NumLock states): Invoke the Task Manager or NT Security dialog.
Ctrl + Shift + Escape (2000/XP ) or (Ctrl + Alt + NumpadDot) : Invoke the task manager. On earlier OSes, acts like Ctrl + Escape.
Printscreen: Copy screenshot of current screen to clipboard.
Alt + Printscreen: Copy screenshot of current active window to clipboard.
Ctrl + Alt + Down Arrow: Invert screen. Untested on OSes other than XP.
Ctrl + Alt + Up Arrow: Undo inversion.
Win + B : Move focus to systray icons.
2.) Generic
Ctrl + C or Ctrl + Insert: Copy.
Ctrl + X or Shift + Delete: Cut.
Ctrl + V or Shift + Insert: Paste/Move.
Ctrl + N: New... File, Tab, Entry, etc.
Ctrl + S: Save.
Ctrl + O: Open...
Ctrl + P: Print.
Ctrl + Z: Undo.
Ctrl + A: Select all.
Ctrl + F: Find...
Ctrl+W : to close the current window
Ctrl + F4: Close tab or child window.
F1: Open help.
F11: Toggle full screen mode.
Alt or F10: Activate menu bar.
Alt + Space: Display system menu. Same as clicking the icon on the titlebar.
Escape: Remove focus from current control/menu, or close dialog box.
3.) Generic Navigation
Tab: Forward one item.
Shift + Tab: Backward one item.
Ctrl + Tab: Cycle through tabs/child windows.
Ctrl + Shift + Tab: Cycle backwards through tabs/child windows.
Enter: If a button's selected, click it, otherwise, click default button.
Space: Toggle items such as radio buttons or checkboxes.
Alt + (Letter): Activate item corresponding to (Letter). (Letter) is the underlined letter on the item's name.
Ctrl + Left: Move cursor to the beginning of previous word.
Ctrl + Right: Move cursor to the beginning of next word.
Ctrl + Up: Move cursor to beginning of previous paragraph. This and all subsequent Up/Down hotkeys in this section have only been known to work in RichEdit controls.
Ctrl + Down: Move cursor to beginning of next paragraph.
Shift + Left: Highlight one character to the left.
Shift + Right: Highlight one character to the right.
Shift + Up: Highlight from current cursor position, to one line up.
Shift + Down: Highlight from current cursor position, to one line down.
Ctrl + Shift + Left: Highlight to beginning of previous word.
Ctrl + Shift + Right: Highlight to beginning of next word.
Ctrl + Shift + Up: Highlight to beginning of previous paragraph.
Ctrl + Shift + Down: Highlight to beginning of next paragraph.
Home: Move cursor to top of a scrollable control.
End: Move cursor to bottom of a scrollable control.
4.) Generic File Browser
Arrow Keys: Navigate.
Shift + Arrow Keys: Select multiple items.
Ctrl + Arrow Keys: Change focus without changing selection. "Focus" is the object that will run on Enter. Space toggles selection of the focused item.
(Letter): Select first found item that begins with (Letter).
BackSpace: Go up one level to the parent directory.
Alt + Left: Go back one folder.
Alt + Right: Go forward one folder.
Enter: Activate (Double-click) selected item(s).
Alt + Enter: View properties for selected item.
F2: Rename selected item(s).
Ctrl + NumpadPlus: In a Details view, resizes all columns to fit the longest item in each one.
Delete: Delete selected item(s).
Shift + Delete: Delete selected item(s); bypass Recycle Bin.
Ctrl while dragging item(s): Copy.
Ctrl + Shift while dragging item(s): Create shortcut(s).
In tree pane, if any:
Left: Collapse the current selection if expanded, or select the parent folder.
Right: Expand the current selection if collapsed, or select the first subfolder.
NumpadAsterisk: Expand currently selected directory and all subdirectories. No undo.
NumpadPlus: Expand currently selected directory.
NumpadMinus: Collapse currently selected directory.
5.) Accessibility
Right Shift for eight seconds: Toggle FilterKeys on and off. FilterKeys must be enabled.
Left Alt + Left Shift + PrintScreen: Toggle High Contrast on and off. High Contrast must be enabled.
Left Alt + Left Shift + NumLock: Toggle MouseKeys on and off. MouseKeys must be enabled.
NumLock for five seconds: Toggle ToggleKeys on and off. ToggleKeys must be enabled.
Shift five times: Toggle StickyKeys on and off. StickyKeys must be enabled.
6.) Microsoft Natural Keyboard with IntelliType Software Installed
Win + L: Log off Windows.
Win + P: Open Print Manager.
Win + C: Open control panel.
Win + V: Open clipboard.
Win + K: Open keyboard properties.
Win + I: Open mouse properties.
Win + A: Open Accessibility properties.
Win + Space: Displays the list of Microsoft IntelliType shortcut keys.
Win + S: Toggle CapsLock on and off.
7.) Remote Desktop Connection Navigation
Ctrl + Alt + End: Open the NT Security dialog.
Alt + PageUp: Switch between programs.
Alt + PageDown: Switch between programs in reverse.
Alt + Insert: Cycle through the programs in most recently used order.
Alt + Home: Display start menu.
Ctrl + Alt + Break: Switch the client computer between a window and a full screen.
Alt + Delete: Display the Windows menu.
Ctrl + Alt + NumpadMinus: Place a snapshot of the entire client window area on the Terminal server clipboard and provide the same functionality as pressing Alt + PrintScreen on a local computer.
Ctrl + Alt + NumpadPlus: Place a snapshot of the active window in the client on the Terminal server clipboard and provide the same functionality as pressing PrintScreen on a local computer.
8.) Mozilla Firefox Shortcuts
Ctrl + Tab or Ctrl + PageDown: Cycle through tabs.
Ctrl + Shift + Tab or Ctrl + PageUp: Cycle through tabs in reverse.
Ctrl + (1-9): Switch to tab corresponding to number.
Ctrl + N: New window.
Ctrl + T: New tab.
Ctrl + L or Alt + D or F6: Switch focus to location bar.
Ctrl + Enter: Open location in new tab.
Shift + Enter: Open location in new window.
Ctrl + K or Ctrl + E: Switch focus to search bar.
Ctrl + O: Open a local file.
Ctrl + W: Close tab, or window if there's only one tab open.
Ctrl + Shift + W: Close window.
Ctrl + S: Save page as a local file.
Ctrl + P: Print page.
Ctrl + F or F3: Open find toolbar.
Ctrl + G or F3: Find next...
Ctrl + Shift + G or Shift + F3: Find previous...
Ctrl + B or Ctrl + I: Open Bookmarks sidebar.
Ctrl + H: Open History sidebar.
Escape: Stop loading page.
Ctrl + R or F5: Reload current page.
Ctrl + Shift + R or Ctrl + F5: Reload current page; bypass cache.
Ctrl + U: View page source.
Ctrl + D: Bookmark current page.
Ctrl + NumpadPlus or Ctrl + Equals (+/=): Increase text size.
Ctrl + NumpadMinus or Ctrl + Minus: Decrease text size.
Ctrl + Numpad0 or Ctrl + 0: Set text size to default.
Alt + Left or Backspace: Back.
Alt + Right or Shift + Backspace: Forward.
Alt + Home: Open home page.
Ctrl + M: Open new message in integrated mail client.
Ctrl + J: Open Downloads dialog.
F6: Switch to next frame. You must have selected something on the page already, e.g. by use of Tab.
Shift + F6: Switch to previous frame.
Apostrophe ('): Find link as you type.
Slash (/): Find text as you type.
9.) GMail
Note: Must have "keyboard shortcuts" on in settings.
C: Compose new message.
Shift + C: Open new window to compose new message.
Slash (/): Switch focus to search box.
K: Switch focus to the next most recent email. Enter or "O" opens focused email.
J: Switch focus to the next oldest email.
N: Switch focus to the next message in the "conversation." Enter or "O" expands/collapses messages.
P: Switch focus to the previous message.
U: Takes you back to the inbox and checks for new mail.
Y: Various actions depending on current view:
Has no effect in "Sent" and "All Mail" views.
Inbox: Archive email or message.
Starred: Unstar email or message.
Spam: Unmark as spam and move back to "Inbox."
Trash: Move back to "Inbox."
Any label: Remove the label.
X: "Check" an email. Various actions can be performed against all checked emails.
S: "Star" an email. Identical to the more familiar term, "flagging."
R: Reply to the email.
A: Reply to all recipients of the email.
F: Forward an email.
Shift + R: Reply to the email in a new window.
Shift + A: Reply to all recipients of the email in a new window.
Shift + F: Forward an email in a new window.
Shift + 1 (!): Mark an email as spam and remove it from the inbox.
G then I: Switch to "Inbox" view.
G then S: Switch to "Starred" view.
G then A: Switch to "All Mail" view.
G then C: Switch to "Contacts" view.
G then S: Switch to "Drafts" view.
10.) List of F1-F9 Key Commands for the Command Prompt
F1 / right arrow: Repeats the letters of the last command line, one by one.
F2: Displays a dialog asking user to "enter the char to copy up to" of the last command line
F3: Repeats the last command line
F4: Displays a dialog asking user to "enter the char to delete up to" of the last command line
F5: Goes back one command line
F6: Enters the traditional CTRL+Z (^z)
F7: Displays a menu with the command line history
F8: Cycles back through previous command lines (beginning with most recent)
F9: Displays a dialog asking user to enter a command number, where 0 is for first command line entered.
Alt+Enter: toggle fullScreen mode.
up/down: scroll thru/repeat previous entries
Esc: delete line