Monday, September 14, 2009

Well-known ports: 0–1023

0-1023

Port

Description

Status

0/TCP,UDP

Reserved

Official

1/TCP,UDP

TCP Port Service Multiplexer

Official

2/TCP,UDP

Management Utility

Official

3/TCP,UDP

Compression Process

Official

5/TCP,UDP

Remote Job Entry

Official

7/TCP,UDP

Echo

Official

9/TCP,UDP

Discard

Official

11/TCP,UDP

Active Users

Official

13/TCP,UDP

DAYTIME – (RFC 867)

Official

17/TCP,UDP

Quote of the Day

Official

18/TCP,UDP

Message Send Protocol

Official

19/TCP,UDP

Character Generator

Official

20/TCP

FTP – data

Official

21/TCP

FTP—control (command)

Official

22/TCP,UDP

Secure Shell (SSH)—used for secure logins, file transfers (scp, sftp) and port forwarding

Official

23/TCP

Telnet protocol—unencrypted text communications

Official

25/TCP

Simple Mail Transfer Protocol (SMTP)—used for e-mail routing between mail servers

Official

34/TCP,UDP

Remote File (RF)—used to transfer files between machines

Unofficial

35/TCP,UDP

Any private printer server protocol

Official

35/TCP,UDP

QMS Magicolor 2 printer server protocol

Unofficial

37/TCP,UDP

TIME protocol

Official

39/TCP,UDP

Resource Location Protocol[2] (RLP)—used for determining the location of higher level services from hosts on a network

Official

41/TCP,UDP

Graphics

Official

42/TCP,UDP

nameserver, ARPA Host Name Server Protocol

Official

42/TCP,UDP

WINS

Unofficial

43/TCP

WHOIS protocol

Official

49/TCP,UDP

TACACS aka TACOS Login Host protocol

Official

52/TCP,UDP

XNS (Xerox Network Services) Time Protocol

Official

53/TCP,UDP

Domain Name System (DNS)

Official

54/TCP,UDP

XNS (Xerox Network Services) Clearinghouse

Official

55/TCP,UDP

ISI-GL (ISI Graphics Language)

Unofficial

56/TCP,UDP

XNS (Xerox Network Services) Authentication

Official

56/TCP,UDP

RAP (Route Access Protocol)[3]

Unofficial

57/TCP

MTP, Mail Transfer Protocol

Unofficial

58/TCP,UDP

XNS (Xerox Network Services) Mail

Official

67/UDP

Bootstrap Protocol (BOOTP) Server; also used by Dynamic Host Configuration Protocol (DHCP)

Official

68/UDP

Bootstrap Protocol (BOOTP) Client; also used by Dynamic Host Configuration Protocol (DHCP)

Official

69/UDP

Trivial File Transfer Protocol (TFTP)

Official

70/TCP

Gopher protocol

Official

79/TCP

Finger protocol

Official

80/TCP,UDP

Hypertext Transfer Protocol (HTTP)

Official

81/TCP

Torpark—Onion routing

Unofficial

82/UDP

Torpark—Control

Unofficial

83/TCP

MIT ML Device

Official

88/TCP,UDP

Kerberos—authentication system

Official

90/TCP,UDP

dnsix (DoD Network Security for Information Exchange) Securit Attribute Token Map

Official

90/TCP,UDP

Pointcast

Unofficial

99/TCP

WIP Message Protocol

Unofficial

101/TCP

NIC host name

Official

102/TCP

ISO-TSAP (Transport Service Access Point) Class 0 protocol[4]

Official

104/TCP,UDP

ACR/NEMA Digital Imaging and Communications in Medicine

Official

107/TCP

Remote TELNET Service[5] protocol

Official

109/TCP

Post Office Protocol 2 (POP2)

Official

110/TCP

Post Office Protocol 3 (POP3)

Official

111/TCP,UDP

Sun Remote Procedure Call

Official

113/UDP

ident—user identification system, used by IRC servers to identify users

Official

113/TCP,UDP

Authentication Service (auth)

Official

115/TCP

Simple File Transfer Protocol (SFTP)

Official

117/TCP

UUCP Path Service

Official

118/TCP,UDP

SQL (Structured Query Language) Services

Official

119/TCP

Network News Transfer Protocol (NNTP)—used for retrieving newsgroup messages

Official

123/UDP

Network Time Protocol (NTP)—used for time synchronization

Official

135/TCP,UDP

DCE endpoint resolution

Official

135/TCP,UDP

Microsoft EPMAP (End Point Mapper), also known as DCE/RPC Locator service[6], used to remotely manage services including DHCP server, DNS server and WINS. Also used by DCOM

Unofficial

137/TCP,UDP

NetBIOS NetBIOS Name Service

Official

138/TCP,UDP

NetBIOS NetBIOS Datagram Service

Official

139/TCP,UDP

NetBIOS NetBIOS Session Service

Official

143/TCP,UDP

Internet Message Access Protocol (IMAP)—used for retrieving, organizing, and synchronizing e-mail messages

Official

152/TCP,UDP

Background File Transfer Program (BFTP)[7]

Official

153/TCP,UDP

SGMP, Simple Gateway Monitoring Protocol

Official

156/TCP,UDP

SQL Service

Official

158/TCP,UDP

DMSP, Distributed Mail Service Protocol

Unofficial

161/TCP,UDP

Simple Network Management Protocol (SNMP)

Official

162/TCP,UDP

Simple Network Management Protocol Trap (SNMPTRAP)[8]

Official

170/TCP

Print-srv, Network PostScript

Official

177/TCP,UDP

X Display Manager Control Protocol (XDMCP)

Official

179/TCP

BGP (Border Gateway Protocol)

Official

194/TCP,UDP

IRC (Internet Relay Chat)

Official

199/TCP,UDP

SMUX, SNMP Unix Multiplexer

Official

201/TCP,UDP

AppleTalk Routing Maintenance

Official

209/TCP,UDP

The Quick Mail Transfer Protocol

Official

213/TCP,UDP

IPX

Official

218/TCP,UDP

MPP, Message Posting Protocol

Official

220/TCP,UDP

IMAP, Interactive Mail Access Protocol, version 3

Official

259/TCP,UDP

ESRO, Efficient Short Remote Operations

Official

264/TCP,UDP

BGMP, Border Gateway Multicast Protocol

Official

311/TCP

Mac OS X Server Admin (officially AppleShare IP Web administration)

Official

308/TCP

Novastor Online Backup

Official

318/TCP,UDP

PKIX TSP, Time Stamp Protocol

Official

323/TCP,UDP

IMMP, Internet Message Mapping Protocol

Unofficial

350/TCP,UDP

MATIP-Type A, Mapping of Airline Traffic over Internet Protocol

Official

351/TCP,UDP

MATIP-Type B, Mapping of Airline Traffic over Internet Protocol

Official

366/TCP,UDP

ODMR, On-Demand Mail Relay

Official

369/TCP,UDP

Rpc2portmap

Official

370/TCP,UDP

codaauth2 – Coda authentication server

Unofficial

370/TCP,UDP

securecast1 – Outgoing packets to NAI's servers, http://www.nai.com/asp_set/anti_virus/alerts/faq.as

Unofficial

371/TCP,UDP

ClearCase albd

Official

383/TCP,UDP

HP data alarm manager

Official

384/TCP,UDP

A Remote Network Server System

Official

387/TCP,UDP

AURP, AppleTalk Update-based Routing Protocol

Official

389/TCP,UDP

Lightweight Directory Access Protocol (LDAP)

Official

401/TCP,UDP

UPS Uninterruptible Power Supply

Official

402/TCP

Altiris, Altiris Deployment Client

Unofficial

411/TCP

Direct Connect Hub

Unofficial

412/TCP

Direct Connect Client-to-Client

Unofficial

427/TCP,UDP

Service Location Protocol (SLP)

Official

443/TCP,UDP

Hypertext Transfer Protocol over TLS/SSL (HTTPS)

Official

444/TCP,UDP

SNPP, Simple Network Paging Protocol (RFC 1568)

Official

445/TCP

Microsoft-DS Active Directory, Windows shares

Official

445/UDP

Microsoft-DS SMB file sharing

Official

464/TCP,UDP

Kerberos Change/Set password

Official

465/TCP

Cisco protocol

Unofficial

465/TCP

SMTP over SSL

Unofficial

475/TCP

tcpnethaspsrv (Hasp services, TCP/IP version)

Official

497/TCP

Dantz Retrospect

Official

500/UDP

Internet Security Association and Key Management Protocol (ISAKMP)

Official

501/TCP

STMF, Simple Transportation Management Framework – DOT NTCIP 1101

Unofficial

502/TCP,UDP

Modbus, Protocol

Unofficial

504/TCP,UDP

Citadel – multiservice protocol for dedicated clients for the Citadel groupware system

Official

510/TCP

First Class Protocol

Unofficial

512/TCP

Rexec, Remote Process Execution

Official

512/UDP

comsat, together with biff

Official

513/TCP

Login

Official

513/UDP

Who

Official

514/TCP

Shell—used to execute non-interactive commands on a remote system

Official

514/UDP

Syslog—used for system logging

Official

515/TCP

Line Printer Daemon—print service

Official

517/UDP

Talk

Official

518/UDP

NTalk

Official

520/TCP

efs, extended file name server

Official

520/UDP

Routing—RIP

Official

524/TCP,UDP

NCP (NetWare Core Protocol) is used for a variety things such as access to primary NetWare server resources, Time Synchronization, etc.

Official

525/UDP

Timed, Timeserver

Official

530/TCP,UDP

RPC

Official

531/TCP,UDP

AOL Instant Messenger, IRC

Unofficial

532/TCP

netnews

Official

533/UDP

netwall, For Emergency Broadcasts

Official

540/TCP

UUCP (Unix-to-Unix Copy Protocol)

Official

542/TCP,UDP

commerce (Commerce Applications)

Official

543/TCP

klogin, Kerberos login

Official

544/TCP

kshell, Kerberos Remote shell

Official

546/TCP,UDP

DHCPv6 client

Official

547/TCP,UDP

DHCPv6 server

Official

548/TCP

Apple Filing Protocol (AFP) over TCP

Official

550/UDP

new-rwho, new-who

Official

554/TCP,UDP

Real Time Streaming Protocol (RTSP)

Official

556/TCP

Remotefs, RFS, rfs_server

Official

560/UDP

rmonitor, Remote Monitor

Official

561/UDP

monitor

Official

563/TCP,UDP

NNTP protocol over TLS/SSL (NNTPS)

Official

587/TCP

e-mail message submission[9] (SMTP)

Official

591/TCP

FileMaker 6.0 (and later) Web Sharing (HTTP Alternate, also see port 80)

Official

593/TCP,UDP

HTTP RPC Ep Map, Remote procedure call over Hypertext Transfer Protocol, often used by Distributed Component Object Model services and Microsoft Exchange Server

Official

604/TCP

TUNNEL profile[10], a protocol for BEEP peers to form an application layer tunnel

Official

623/UDP

ASF Remote Management and Control Protocol (ASF-RMCP)

Official

631/TCP,UDP

Internet Printing Protocol (IPP)

Official

636/TCP,UDP

Lightweight Directory Access Protocol over TLS/SSL (LDAPS)

Official

639/TCP,UDP

MSDP, Multicast Source Discovery Protocol

Official

641/TCP,UDP

SupportSoft Nexus Remote Command (control/listening): A proxy gateway connecting remote control traffic

Official

646/TCP,UDP

LDP, Label Distribution Protocol, a routing protocol used in MPLS networks

Official

647/TCP

DHCP Failover protocol[11]

Official

648/TCP

RRP (Registry Registrar Protocol)[12]

Official

652/TCP

DTCP, Dynamic Tunnel Configuration Protocol

Unofficial

653/TCP,UDP

SupportSoft Nexus Remote Command (data): A proxy gateway connecting remote control traffic

Official

654/TCP

AODV (Ad-hoc On-demand Distance Vector)

Official

655/TCP

IEEE MMS (IEEE Media Management System)[13][14]

Official

657/TCP,UDP

IBM RMC (Remote monitoring and Control) protocol, used by System p5 AIX Integrated Virtualization Manager (IVM)[15] and Hardware Management Console to connect managed logical partitions (LPAR) to enable dynamic partition reconfiguration

Official

660/TCP

Mac OS X Server administration

Official

665/TCP

sun-dr, Remote Dynamic Reconfiguration

Unofficial

666/UDP

Doom, first online first-person shooter

Official

674/TCP

ACAP (Application Configuration Access Protocol)

Official

691/TCP

MS Exchange Routing

Official

692/TCP

Hyperwave-ISP

Official

694/UDP

Linux-HA High availability Heartbeat

Unofficial

695/TCP

IEEE-MMS-SSL (IEEE Media Management System over SSL)[16]

Official

698/UDP

OLSR (Optimized Link State Routing)

Official

699/TCP

Access Network

Official

700/TCP

EPP (Extensible Provisioning Protocol), a protocol for communication between domain name registries and registrars (RFC 4934)

Official

701/TCP

LMP (Link Management Protocol (Internet))[17], a protocol that runs between a pair of nodes and is used to manage traffic engineering (TE) links

Official

702/TCP

IRIS[18][19] (Internet Registry Information Service) over BEEP (Blocks Extensible Exchange Protocol)[20] (RFC 3983)

Official

706/TCP

SILC, Secure Internet Live Conferencing

Official

711/TCP

Cisco TDP, Tag Distribution Protocol[21][22][23]—being replaced by the MPLS Label Distribution Protocol[24]

Official

712/TCP

TBRPF, Topology Broadcast based on Reverse-Path Forwarding routing protocol (RFC 3684)

Official

712/UDP

Promise RAID Controller

Unofficial

720/TCP

SMQP, Simple Message Queue Protocol

Unofficial

749/TCP,UDP

Kerberos administration

Official

750/TCP

rfile

Official

750/UDP

loadav

Official

750/UDP

kerberos-iv, Kerberos version IV

Official

751/TCP,UDP

pump

Official

751/TCP,UDP

kerberos_master, Kerberos authentication

Unofficial

752/TCP

qrh

Official

752/UDP

qrh

Official

752/UDP

userreg_server, Kerberos Password (kpasswd) server

Unofficial

753/TCP

Reverse Routing Header (rrh)[25]

Official

753/UDP

Reverse Routing Header (rrh)

Official

753/UDP

passwd_server, Kerberos userreg server

Unofficial

754/TCP

tell send

Official

754/TCP

krb5_prop, Kerberos v5 slave propagation

Unofficial

754/UDP

tell send

Official

760/TCP,UDP

ns

Official

760/TCP,UDP

krbupdate [kreg], Kerberos registration

Unofficial

782/TCP

Conserver serial-console management server

Unofficial

783/TCP

SpamAssassin spamd daemon

Unofficial

829/TCP

CMP (Certificate Management Protocol)

Unofficial

843/TCP

Adobe Flash socket policy server

Unofficial

860/TCP

iSCSI (RFC 3720)

Official

873/TCP

rsync file synchronisation protocol

Official

888/TCP

cddbp, CD DataBase (CDDB) protocol (CDDBP)—unassigned but widespread use

Unofficial

901/TCP

Samba Web Administration Tool (SWAT)

Unofficial

901/TCP, UDP

VMware Virtual Infrastructure Client (UDP from server being managed to management console)

Unofficial

902/TCP

VMware Server Console (TCP from management console to server being Managed)

Unofficial

902/UDP

VMware Server Console (UDP from server being managed to management console)

Unofficial

903/TCP

VMware Remote Console [26]

Unofficial

904/TCP

VMware Server Alternate (if 902 is in use, i.e. SUSE linux)

Unofficial

911/TCP

Network Console on Acid (NCA)—local tty redirection over OpenSSH

Unofficial

953/TCP,UDP

Domain Name System (DNS) RDNC Service

Unofficial

981/TCP

SofaWare Technologies Remote HTTPS management for firewall devices running embedded Check Point FireWall-1 software

Unofficial

989/TCP,UDP

FTPS Protocol (data): FTP over TLS/SSL

Official

990/TCP,UDP

FTPS Protocol (control): FTP over TLS/SSL

Official

991/TCP,UDP

NAS (Netnews Administration System)

Official

992/TCP,UDP

TELNET protocol over TLS/SSL

Official

993/TCP

Internet Message Access Protocol over SSL (IMAPS)

Official

995/TCP

Post Office Protocol 3 over TLS/SSL (POP3S)

Official

999/TCP

ScimoreDB Database System

Unofficial

1001/TCP

JtoMB

Unofficial

1023/TCP,UDP

Reserved[1]

Official

Monday, September 7, 2009

MCSE Documents Download

winxp70270.zip

mcsepdf1723.zip


mcse2631win2k3.zip

mcse125of31win2k3.zip

folder lock.bat

Anyplace_Control_v4.9.0.0.zip

HP_BASICS_CMDS.pdf

biometric_software.rar

database_monitoring_softwares.doc

sitrace_setup.exe

description_of_SI_Trace.doc

Vuze_Installer_cnet.exe

vlc-0.9.8a-win32.exe

Setup_MagicISO.exe


klmcodec154.exe

Firefox_Setup_3.0.5.exe

Windows.Admin.Scripting.rar


Using_Microsoft_Exchange_Server_Load_Simulator_2000.doc

Using_Microsoft_Exchange_2000_Conferencing_Server_over_the_Internet.doc

Upgrading_Public_Folders.doc

Upgrading_from_Microsoft_Exchange_Server_5.5_to_Microsoft_Exchange_2000_Server_A_Six-Step_Case_Sc.do

Understanding_Microsoft_Outlook_2002_Improvements.doc

Understanding_and_Troubleshooting_Directory_Access.pdf

Understanding_and_Deploying_Exchange_2000_Active_Directory_Connector.doc

Troubleshooting_Outlook_Web_Access_in_Microsoft_Exchange_2000_Server.doc

Troubleshooting_Exchange_2000_Performance.doc

The_Role_of_Groups_and_Access_Control_Lists_in_Microsoft_Exchange_2000_Server_Deployment.pdf

The_Role_of_Groups_and_Access_Control_Lists_in_Microsoft_Exchange_2000_Server_Deployment.doc

Public_Folder_Permissions_in_a_Mixed_Mode_Microsoft_Exchange_Organization.pdf

Outlook_Web_Access_in_Exchange_2000_Server.pdf

Monitoring_Exchange_2000_Server_with_Microsoft_Operations_Manager_2000.pdf

Migration_and_Coexistence_of_Lotus_Notes_Applications_using_Microsoft_Application_Services_for_Lo.pd

Migrating_Mailboxes_from_Microsoft_Exchange_Server_version_5.5_to_Microsoft_Exchange_2000_Server.pdf

Microsoft_Exchange_Scalability_Testing.pdf

Microsoft_Exchange_2000_Server_Service_Pack_3_Deployment_Guide.pdf

Microsoft_Exchange_2000_Server_Service_Pack_2_Deployment_Guide.pdf

Microsoft_Exchange_2000_Server_Installation_and_Setup.pdf

Microsoft_Exchange_2000_Server_Design_and_Implementation_for_Woodgrove_Bank.pdf

Microsoft_Exchange_2000_Server_Back_End_Mailbox_Scalability.pdf

Microsoft_Exchange_2000_Mailbox_Folder_Structure.pdf

Microsoft_Exchange_2000_Instant_Messaging_Setup.pdf

Microsoft_Exchange_2000_Front-End_Server__and_SMTP_Gateway_Hardware_Scalability_Guide.pdf

Microsoft_Exchange_2000_and_Novell_GroupWise_Coexistence_and_Migration.pdf

Microsoft_Exchange_2000_and_Lotus_Domino_Coexistence_and_Migration.pdf

Mailbox_Recovery_for_Microsoft_Exchange_2000_Server.pdf

Lotus_ccMail_and_Exchange_2000_Server_Coexistence_and_Migration.doc

Instant_Message_Polling_and_Fixed_Port_Callback_Delivery.pdf

Installing_Microsoft_Exchange_2000_Conferencing_Server_in_a_Mixed_Site.pdf

In-Place_Upgrade_from_Microsoft_Exchange_5.5_to_Microsoft_Exchange_2000.pdf

How_To_Install_Mobile_Information_Server_2002_ActiveSync.pdf

ForestPrep_and_DomainPrep.pdf

Exchange_Instant_Messaging_Over_the_Internet.pdf

Exchange_2000_Recipient_Management.pdf

Exchange_2000_Conferencing_Server_and_H_323.PDF

Exchange_2000_Capacity_Planning___Topology_Calculator.pdf

Disaster_Recovery_for_Microsoft_Exchange_2000_Server.pdf

Deploying_Policy_Control_with_Microsoft_Windows_Messenger_version_4.6_for_Exchange_Instant_Messag.pd

Deploying_Microsoft_Exchange_2000_Server_Clusters.pdf

Deploying_and_Maintaining_Microsoft_Exchange_2000_Conferencing_Server.doc

Customizing_Microsoft_Outlook_Web_Access.pdf

Configuring_SMTP_in_Exchange_2000.doc

Client_Network_Traffic_with_Exchange_2000.pdf

Best_Practices_for_Deploying_Full-Text_Indexing.pdf

Working_with_the_Exchange_Server_2003_Store.doc

Using_Microsoft_Exchange_Server_Load_Simulator_2000.doc

Using_Microsoft_Exchange_2000_Conferencing_Server_over_the_Internet.doc

Using_ISA_Server_with_Exchange_2003.doc

Upgrading_Public_Folders.doc

Upgrading_from_Microsoft_Exchange_Server_5.5_to_Microsoft_Exchange_2000_Server_A_Six-Step_Case_Sc.pd

Upgrading_from_Microsoft_Exchange_Server_5.5_to_Microsoft_Exchange_2000_Server_A_Six-Step_Case_Sc.do

Understanding_Microsoft_Outlook_2002_Improvements.doc

Understanding_and_Troubleshooting_Directory_Access.pdf

Understanding_and_Deploying_Exchange_2000_Active_Directory_Connector.doc

Troubleshooting_Outlook_Web_Access_in_Microsoft_Exchange_2000_Server.doc

Troubleshooting_Exchange_2000_Performance.doc

The_Role_of_Groups_and_Access_Control_Lists_in_Microsoft_Exchange_2000_Server_Deployment.pdf

The_Role_of_Groups_and_Access_Control_Lists_in_Microsoft_Exchange_2000_Server_Deployment.doc

Storage_Solutions_for_Microsoft_Exchange_2000_Server.doc

secmod42.pdf

RSA_SecurID_and_Microsoft_MIS_Server_2002_Integration.doc

Public_Folder_Permissions_in_a_Mixed_Mode_Microsoft_Exchange_Organization.pdf

Planning_an_Exchange_Server_2003_Messaging_System.doc

Outlook_Web_Access_in_Exchange_2000_Server.pdf

Microsoft_Exchange_Server_2003.zip

Microsoft_Exchange_Server_2003.doc

Microsoft_Exchange_Scalability_Testing.pdf

Microsoft_Exchange_2000_Server_Service_Pack_3_Deployment_Guide.pdf

Microsoft_Exchange_2000_Server_Service_Pack_2_Deployment_Guide.pdf

Microsoft_Exchange_2000_Server_Installation_and_Setup.pdf

Microsoft_Exchange_2000_Server_Design_and_Implementation_for_Woodgrove_Bank.pdf

Microsoft_Exchange_2000_Server_Back_End_Mailbox_Scalability.pdf

Microsoft_Exchange_2000_Mailbox_Folder_Structure.pdf

Microsoft_Exchange_2000_Instant_Messaging_Setup.pdf

Microsoft_Exchange_2000_Front-End_Server__and_SMTP_Gateway_Hardware_Scalability_Guide.pdf

Microsoft_Exchange_2000_and_Novell_GroupWise_Coexistence_and_Migration.pdf

Microsoft_Exchange_2000_and_Lotus_Domino_Coexistence_and_Migration.pdf

Mailbox_Recovery_for_Microsoft_Exchange_2000_Server.pdf

Lotus_ccMail_and_Exchange_2000_Server_Coexistence_and_Migration.doc

IS_Requirements_for_Dec_4_Walk-ins.doc

InstantMessaging.doc

Instant_Message_Polling_and_Fixed_Port_Callback_Delivery.pdf

Installing_Microsoft_Exchange_2000_Conferencing_Server_in_a_Mixed_Site.pdf

In-Place_Upgrade_from_Microsoft_Exchange_5.5_to_Microsoft_Exchange_2000.pdf

ForestPrep_and_DomainPrep.pdf

Exchange_Server_2003_Administration_Guide.doc

Exchange_ClusterInstall.doc

Exchange_Server_2003_Deployment_Guide.doc

Exchange_Instant_Messaging_Over_the_Internet.pdf

Exchange_2003_Interoperability_and_Migration_Guide.doc

Exchange_2003_Front-End_Back-End_Topology.doc

Exchange_2003_Disaster_Recovery_Operations.doc

Exchange_2000_Recipient_Management.pdf

Exchange_2000_Conferencing_Server_and_H_323.PDF

Exchange_2000_Capacity_Planning___Topology_Calculator.pdf

Disaster_Recovery_for_Microsoft_Exchange_2000_Server.pdf

Deploying_Policy_Control_with_Microsoft_Windows_Messenger_version_4.6_for_Exchange_Instant_Messag.pd

Deploying_Microsoft_Exchange_2000_Server_Clusters.pdf

Deploying_and_Maintaining_Microsoft_Exchange_2000_Conferencing_Server.doc

10_things_wsus.ppt

Users_and_Permissions.ppt

Profiles_and_Home_Folder.ppt

Printers_and_Groups.ppt

Migrating_users_from_NT_To_2003.ppt

ISA.PPT

INTRODUCTION_WINDOWS_2003.ppt

Gorup_Policy_-I.ppt

Domain_Renaming.ppt

DNS.ppt

DHCP.ppt

DFS_and_Disk_Quota.ppt

Backup_and_Recovery.ppt

ACTIVE_DIRECTORY-_I.ppt

ACTIVE_DIRECTORY_-_IIII.ppt

ACTIVE_DIRECTORY_-_III.ppt

ACTIVE_DIRECTORY_-_II.ppt

Bluetooth_Software.zip

Network_Monitering_tool.rar

keyfinder.zip

FastDuplicateFileFinder.exe

ManageEngine_ServiceDesk_Plus.exe

Frozen_Bubble.sis-_nokia-soft4n70.blogspot.com_.rar

ALON_1_.Software.Mp3.Dictaphone.v1.15_www.freedownload-n72.blogspot.com_.rar

zipman_N72 blogspot.com_.rar

winrar_chinnilax.blogspot.com_.rar

adoberead_chinnilax.blogspot.com_.rar

Smart.Guard.v.3.0_chinnilax.blogspot.com_.rar

Ignite_OS_Installation.pdf

Chapter8_Ignite-UX.pdf

TCP-IP___SubNetting.doc

TCP-IP___SubNetting.doc

RIS_-_2.doc

RIS_-_1.doc

RAID.doc

Qmail_Installation.doc

freeproxy400.zip

HP-UX_11i_for_Experienced_System_Network_Administrators.pdf

PHP_MySQLWebDevelopment-AIODRFD.rar

adoberead_freedownload.rar

virusscan_8.5.rar

User_Accounts_and_Fast_User_Switching.doc

Friday, August 21, 2009

Debug a Windows XP batch file and output the current date and time to a log file

The Windows 2003 Resource Kit comes with a batch file command, logtime, that lets you output the current time, date, and a custom text message to a log file. This is great for benchmarking batch files and commands in that you can output when such a command starts and completes.

To run logtime, first download and install the Windows Server 2003 Resource Kit using the instructions mentioned in MalekTips (check the other Windows XP and DOS command tips).

Once the Resource Kit is installed, to view the online help for logtime:

C:\>logtime /?

To write a message to the text file "logtime.log" in the current directory, just issue this command:

C:\>logtime "MESSAGE"

For example, the following command will write the current day, time, and message "Command just completed" to the file logtime.log:

C:\>logtime "Command just completed"

Note that this will display the results of the command to the standard output as well. To hide this:

C:\>@logtime "Command just completed" > nul

XP: kill a Windows process from the command line with taskkill


The ability to perform tasks from a system’s command line allows those tasks to be used in batch files. This recipe describes several uses of taskkill to terminate Windows processes.

If you know the name of a process to kill, for example notepad.exe, use the following command from a command prompt to end it:

taskkill /IM notepad.exe


This will cause the program to terminate gracefully, asking for confirmation if there are unsaved changes. To forcefully kill the same process, add the /F option to the command line. Be careful with the /F option as it will terminate all matching processes without confirmation.To kill a single instance of a process, specify its process id (PID). For example, if the desired process has a PID of 827, use the following command to kill it:

taskkill /PID 827


Using filters, a variety of different patterns can be used to specify the processes to kill. For example, the following filter syntax will forcefully kill all processes owned by the user Quinn:

taskkill /F /FI “USERNAME eq Quinn”


The following table shows the available filters and their use.

Filter Name Valid Operators Valid Value(s)
———– ————— ————–
STATUS eq ne RUNNING | NOT RESPONDING
IMAGENAME eq ne Image name
PID eq ne gt lt ge le PID value
SESSION eq ne gt lt ge le Session number.
CPUTIME eq ne gt lt ge le CPU time in the format
of hh:mm:ss.
MEMUSAGE eq ne gt lt ge le Memory usage in KB
USERNAME eq ne User name in [domain\]user
format
MODULES eq ne DLL name
SERVICES eq ne Service name
WINDOWTITLE eq ne Window titleeq: equals ne: not equal
gt: greater than lt: less than
gt: greater than or equal le: less than or equal

WindowsXP: Using the Command prompt to see and kill processes

If you are a WindowsXP user then you must be already familiar with the life-saving graphical tool called “Task Manager” on Windows. Whenever the PC starts hanging and the processes start eating up a lot of memory (Sadly most of the time its Firefox for me), we press the alt+ctr+del key to bring up the the “Task Manager” and try to kill the memory eating processes and the ones which are “not responding”. Well, you should also know that this can be done efficiently from the command prompt as well.

As my project work requires writing and running codes, I generally have at least one Windows command prompt open. If this is the case with you then it is much faster to manage your windows processes from command prompt than to open up the Task Manager, just like we do on Linux using “ps” and “kill” command. Get to know the following commands and you can easily use the command prompt to see and kill processes.

1. Tasklist : This command is similar to “ps” command on Linux and is used to see the details of the programs and processes that are running in Windows. Tasklist can be applied to see how much memory and CPU time running processes are using, what DLL files they rely on, and other information. Thus it can be a very useful troubleshooting tool.

  • Processes info: When you enter tasklist on the command prompt, you can see the following informations by default. Image Name, PID, Session Name, Session#, Mem Usage
  • Processes detailed info: Additional info like, Status, User Name, CPU Time, Window Title can be displayed using tasklist /v
  • Services and Processes info: Use tasklist /svc to get a table relating Image Name, PID, and Services, very useful to know the relationship between a process and the services that are running on a system.
  • dlls and Processes info: Tasks and Use tasklist /m to find which DLLs are used by each process.
  • Filtering processes: Processes can be filtered using ImageName, PID, MemUsage, Status, Username and WindowTitle. For Example,
    • Use the following command to to find processes that are not responding.
      • tasklist /fi "status eq not responding"
    • Use the folliwing to list the processes eating up more than 10MB.
      • tasklist /fi "memusage gt 10000"
  • More Info: To get more info on advanced syntax of the command use tasklist /? or refer to Microsoft’s documentation.

(NOTE: Although Tasklist is a part of Windows XP Professional, it does not come with the Home edition. Those with the Home version of XP can download this file and can put it in the system path.)

2. Tskill : This command is used to end a process, using its name of its PID.

  • Kill with name: Use tskill processname to kill a process with name processname. For example:
    • tskill winword (closes all the Microsoft documents that you have open)
  • Kill with PID : Similarly use tskill processid to kill a process with PID processid. Tasklist can be used to find the PID of a process.
  • More Info: To get more info on advanced syntax of the command use tskill /? or refer to Microsoft’s documentation.

(NOTE: Tskill is a part of both Windows XP Professional and the Home edition.)

3. Taskkill : Similar to Tskill, this command is also used to end a process but it provides us more options in doing so. Apart from specifying the PID or the image name of the process to kill, we can also use ceratin filters to kill the matching processes as explained below.

  • Kill with name: Use taskill /IM imagename to kill a process with the given Image name. For example:
    • taskkill /im notepad.exe /f (forces notepad to be killed.)
  • Kill with PID : Use taskill /PID processid to kill a process with the given processid.
  • Filtering Taskkill: Processes to be killed can be filtered using ImageName, PID, MemUsage, CPUTime, Session, Status, Username, WindowTitle, Services or Modules (dll). For Example,
    • Use the following command to forcefully shut down all the processes that are not responding.
      • taskkill /f /fi "status eq not responding"
    • Use the folliwing to close down all programs using more than 10 MB..
      • taskkill /f /fi "memusage gt 10000"
  • More Info: To get more info on advanced syntax of the command use taskkill /? or refer to Microsoft’s documentation.

(NOTE: Taskkill is only a part of Windows XP Professional.)

Sunday, August 16, 2009

How To Hack Isp To Use Internet For Free (tools and video tutorial)

Superscan

Superscan is a free connect-based port scanning software designed to detect open TCP and UDP ports on a target computer, determine which services are running on those ports, and run queries such as whois, ping, ICMP traceroute, and Hostname lookups.

Superscan 4, which is a completely-rewritten update to the other Superscan, features windows enumeration, which can list a variety of important information dealing with Microsoft Windows such as:

* NetBIOS information
* user and Group Accounts
* Network shares
* Trusted Domains
* Services - which are either running or stopped

Superscan is a tool used by both system administrators, crackers and script kiddies to evaluate a computer's security. System administrators can use it to test for possible unauthorized open ports on their computer networks, whereas crackers use it to scan for a potentially insecure port in order to gain illegal access to a system.

Superscan 4 is produced by the Foundstone, a division of McAfee.

Here are some of the new features in this version.

* Superior scanning speed
* Support for unlimited IP ranges
* Improved host detection using multiple ICMP methods
* TCP SYN scanning
* UDP scanning (two methods)
* IP address import supporting ranges and CIDR formats
* Simple HTML report generation
* Source port scanning
* Fast hostname resolving
* Extensive banner grabbing
* Massive built-in port list description database
* IP and port scan order randomization
* A selection of useful tools (ping, traceroute, Whois etc)
* Extensive Windows host enumeration capability


a-Change Mac Address 5.0

Change Mac Address in seconds! Scan Mac Address within any range of IP address. Exports the scanning results from a Mac Address Lookup list. Spoofing the Mac Address of your network card to any new Mac Address.
Wake on Lan. Win Ipconfig.Port Scan.
Scan any range of IP for the proper Mac Address.
Support changing Mac Address of any network cards under Windows NT/2000/XP/95/98/2003.
Support exporting scanning mac address results to txt file.

A-MAC Address Change is a lightweight, easy-use MAC Address scanning and changing software. Don't let its small size fool you! It's filled with features such as:

* It's shockingly easy to use — just a simple input and click, that's it!
* It can scan any range of IP for the proper MAC Address.
* It supports exporting results of your scan to a text file.
* It runs on all Windows™ operating systems.
* It supports any network cards under Windows Me/95/98/NT/2000/XP/2003/Vista.
* It supports changing back to its original physical address.
* It recommends the proper Ethernet network card.
* It displays the information of your computer.
* It automatically checks the legality of IP range.
* It supports changing MAC searching speed.



But what does all this mean to you? Simple...

* You don't blow your time calling the ISP vendor and ask them to update the registered MAC Address to match the new hardware. Some Cable Modem ISP's assign IP addresses base on the PC's MAC addresses. For whatever reason, if you need to swap 2 PC's regularly to connect to the cable modem, it would be a lot easier to spoof MAC Addresses rather than to change Network Interface Card (NIC).
* You can scan the MAC Address of destination computer.
* You can perform security checking on MAC Address based authentication and authorization systems
* You can build Stand-by (offline) systems with the EXACT same Computer Name, IP address, & MAC Address as the Primary Systems. If Stand-by systems should be put online, NO arp table refresh is necessary, which eliminates extra downtime.
* Test network management tools.
* Some software can ONLY be installed and run on the systems with pre-defined MAC address in the license file. Now you can install one of these applications to another system with a different NIC.
* Troubleshoot Network problems: ARP Tables, Routing, Switching, etc.



Download


XP Account Hacker (See Passwords)

Here this is a really nice Live CD i found a long time ago.

"Ophcrack is a Windows password cracker based on rainbow tables. It is a very efficient implementation of rainbow tables done by the inventors of the method. It comes with a GTK+ Graphical User Interface and runs on Windows, Mac OS X (Intel CPU) as well as on Linux."


It will give you the Accounts Passwords after a couple minutes most of the time!





Download:


ophcrack-win32-installer-3.2.rar



Boot your PC in less than 10 seconds


Seems Interesting when you think, how PC Boot within 10 Seconds? Well, you have come to the right place. To a daily user, shaving that extra few seconds for booting up can go a long way. Before I proceed, may I ask for you to backup your data and registry first just to be safe. You are warned, use with caution.


How to bootup computer in 10 seconds lesser?

1) Press Windows Key and "R" to launch the run command.

2) Type "regedit" inside the input space.

3) Navigate to the registry key

HKEY_LOACAL_MECHINE\SYSTEM\CurrentControlSet\Control\ContentIndex

4) Locate the key"Startup Delay" and double click on it.


5) Select Decimal, and change the value to 40000

Enjoy the reduction in startup time and I look forwarding to hearing good news from all of you.

Free FTP Sites for download software, games, movies and music etc....

Recently, i covered the 12+ Free Torrent ,movies, software sites that also offered free content. So read too the list of Top Ranked Torrent Sites.I have posted many internet tools that given free services like online movies , games, internet tv, etc . Today i have another interesting sharing for you. I gethered those ftp websites that provides you software, games, movies and music for downloads. FTP allow you to download absolute free.

Below is the list of more then 50+ FTP sites that give you free content to download like games, books, songs, movies,software etc. I hope you should share and bookmark this page for other can take advantage of it.



Here is the list of FTP websites offered to free Service:

Sunday, July 26, 2009

Repair Missing NTLDR File Using Windows XP Installation CD


Had you ever overcome this situation? Most of system damage of file corrupted issues can be fixed using the Windows XP installation CD.

Just simply follow the above instruction :

a. Boot your computer from your Windows XP CD.

b. When a prompt “press any key to boot from the CD….”, simply hit any key.

c. Once you are in the Windows XP setup menu press the “R” key that’s means to repair the Windows XP system’s file.

d. Log into your Windows installation By pressing the “1″ >> “enter”, you will now logged into your Windows installation process.

e. Then, you’ll be asked for your administrator password, enter that password. If there is no password for your administrator account, just leave it blank.

f. Copy the below two files below using the command line given to the root directory of the primary hard disk [ex : c:/ <<-this is your root directory] from the CD-ROM [ex : f:/ <<-this is your CD-ROM drive letter]. My example above maybe vary to others computer. The command line is ; • copy f:\i386\ntldr c:\ • copy f:\i386\ntdetect.com c:\ g. The example of completed task is like the screen below :

h. After these files have been successfully copied, just remove the CD from the computer and reboot.

Driver Genius Pro v8.0


Driver Genius Professional is a powerful driver manager for Windows that can backup, restore, search and update your drivers automatically in just a several clicks!


[9.6MB]

GetDataBack for NTFS & FAT

Runtime GetDataBack for FAT/NTFS v3.66

Data Recovery Software - GetDataBack is a highly advanced data recovery software, which will help you to get your data back when your drive's partition table, boot record, Master File Table or root directory is corrupt or lost, when a virus has hit the drive, files were deleted, the drive was formatted or struck by a power failure. GetDataBack comes in two flavours, NTFS and FAT depending on what file system you have.

GetDataBack will recover your data if the hard drive's partition table, boot record, FAT/MFT or root directory are lost or damaged, data was lost due to a virus attack, the drive was formatted, fdisk has been run, a power failure has caused a system crash, files were lost due to a software failure, files were accidentally deleted...

GetDataBack can even recover your data when the drive is no longer recognized by Windows. It can likewise be used even if all directory information - not just the root directory- is missing. GetDataBack can even recover your data when the drive is no longer recognized by Windows. It can likewise be used even if all directory information - not just the root directory- is missing.

The tool works at partition level and will restore files and folders exactly how they used to be. It recovers data from floppy and ZIP disks, drive images and even remote drives connected by a serial cable or TCP/IP. As the name says, it restores files from FAT/ NTFS disks - file system used by Windows NT/2000/XP, yet works on all Windows systems. Make sure you never install the program on the to-be-recovered drive and you will never lose important data.

Advanced algorithms will make sure that all directories and sub directories are put together as they were, and that long file names are reconstructed correctly. GetDataBack is read-only, meaning the program will never attempt to write to the drive you are about to recover. Please make sure to read the safety instructions...

The software enables the regular user to conduct his own data recovery by guiding him through three easy to understand steps, thus gives the advanced user the possibility to interfere with the recovery and improve the results, by examining the scan log, the file system details, file and directory information, by selecting the sector range to be scanned, by choosing excessive search for file systems or search for lost files, by calling Runtime's DiskExplorer.

Recover files over your local network or over a serial cable - This feature enables you to run GetDataBack on one computer ("remote") while accessing the drives of another computer ("host"). Recovering data over a network is useful, especially when you are not able to remove the drive you want to recover from and attach it to another computer.

GetDataBack recovers from:
• Hard drives (IDE, SCSI, SATA)
• USB drives
• Firewire drives
• Partitions
• Dynamic Disks
• Floppy drives
• Drive images
• Zip/Jaz drive
• Compact Flash Cards
• Smart Media Cards
• Secure Digital Cards
• USB Flash Drive
• iPod Disks

[5.1MB]
[download now]

Password : www.dl4all.com

Assign Folder as a Drive

Had you heard about assigning a folder as a drive? Several user may need a daily used folder as a drive that appear in "my computer". Here it's the trick;
  1. Open up "command prompt" by typing "cmd" at run box
  2. At "command prompt", type; "subst [drive letter] [folder path address]". eg: "subst m: d:\userfolder"
  3. Hit enter and you can see [as an example a new drive: m:\ drive appear in "my computer"
  4. Simple and easy huh? This assigned drive will be deactivate when you reboot your comp.
  5. So, you can make an auto startup program for this assigned drive.
  6. Here come the trick; Simply open up notepad and type this codes : "subst [drive letter] [folder path address]". eg: "subst m: d:\userfolder" and save it as "urfilename".bat.
  7. This is a batch file that runs the command when you double-click it. "urfilename" refer to any name that you want to put. But make sure you keep the file with *.bat extension in order to make it able to be executed.
  8. Then, simply copy this file to the startup folder under "start>all programs>startup"
  9. This means you have just set up that batch file to runs every time the comp rebooted

Log In Several User In Yahoo! messenger 8

Wanna log in several user in one Yahoo! messenger? Here come the simple trick:


Step 1
Fire up notepad and type :
REGEDIT4
[HKEY_CURRENT_USER\Software\yahoo\pager\Test]
"Plural"=dword:00000001

Step 2
Save the document as Ym8MultiLogin.reg

Step 3
Merge the file that you had just created into the registry and bling!! You can now login with several user in one Yahoo! messenger. Just make sure that you uncheck the "automatic login" at Yahoo! messenger startup.

p/s: you can create uninstallation file by changing the ["Plural"=dword:] value from "00000001" to "00000000" and save it as Ym8MultiLogin_uninstall.reg .If you want to download both of the registration files by simply clicking [here]

Customizing The System Tray Clock

Now, here is a nice trick for you. Customizing your system tray clock like the picture above. It has been applied to my comp :). Pretty nice. But maybe you can corrupt some trial licenses of software that you may have installed. Here it is :

Step 1
Open up your registry editor [start > run > type "regedit"]

Step 2
Navigate to : HKEY_CURRENT_USER\Control Panel\International

Step 3
There is two strings named "s1159" and "s2359". By default, the "s1159" is for AM and "s2359" is for PM. Just right click to the value and edit the AM and PM text. Make sure the text is not too long because if it is too long, it will be a problem to view it.

Step 4
If both of the string is not in there, just create the two strings "s1159" and "s2359"

Now, you have a special clock of your own. Change applied may start to active after user logoff or restart the comp. Else, just refresh your desktop to activate it.. Happy modding :) =X and good luck

Fixing Double-Click Problems In Your Drive

Cannot double-click your drive? My buddy : right here have a brief explanation about how to fix it using flash disinfector and CHKDSK. But here is my solution to fix it within the power of Command Prompt [CMD]

Several things you must know first :

1. When you double-click your drive, it can't be accessed and an alert pop-out : "cannot find file.js@file.exe@file.vbs@something similar".

2. What is the main problems?
Autorun.inf file cannot find the specific file to be executed [been deleted due to virus alert from antivirus software or accidentally deleted]

3. Autorun.inf usage :
  • Not all "autorun.inf" is written to execute the VIRUS.
  • "autorun.inf" may also automatically load a programs in the Interactive-CD media.
  • It can load a portable software for USB drive such as "PortableApps"
  • You can set your drive icon by write some codes in it [will be posted later]
  • So, "autorun.inf" is NOT A VIRUS. It's a kinda file that run under System Explorer.
Looking by the two main cause of these problems, there is 2 simple solution here:

1st :
If you accidentally deleted the files [the programs compiled with "autorun.inf" accidentally deleted]
Solution :
Just unhide the "hidden folder" [tool > folder options > views > "tick" the "show hidden files & folder"]. Then you can delete the "autorun.inf" files [navigate into the drive using the "address bar"]. Your drive can be accessed by using double-click after the comp rebooted.

2nd :
If the files compiled with "autorun.inf" have been deleted automatically due to antivirus response to a suspected files, which means, the compiled files with "autorun.inf" is a virus suspected file. So, the virus can't be executed when you double-click the drive. Antivirus won't delete the "autorun.inf" because it is NOT A VIRUS.
Solution :
Open up Command Prompt [start > run > type "CMD"]

  • The command prompt will now open. Type "attrib -s -h -r -a x:\autorun.inf"
  • Then type "del x:\autorun.inf"

Explanation :
"attrib" : attribute
"s" : system file attribute
"h" : hidden file attribute
"r" : read-only file attribute
"a" : archive file attribute
"x" : this should be change with your drive letter such as C or D or any drive you want to fix
"del" : delete file
"-" : this -ve sign stand for remove, so that it will remove the attribute within the files

So. After you runs the command above, you have successfully remove the "autorun.inf" file in your drive. Just make sure you change the "x" value with your drive letter. Reboot the computer and it's done. Below is a sample advance batch file to remove "autorun.inf" that i've made specially for all my blog reader using these commands above.

Downlaod a sample batch file click here

Change/Add Restrictions And Features [a further info about registry tweak & hack]

If you want to make restrictions to what users can do, you can edit the Registry. You can add and delete Windows features in this key shown below.

Certain things you must know about registry editor:

  1. It's very sensitive. Make sure you change anything inside it if you didn't know about it
  2. Boolean is where elements or "bits" each contain only two possible values, called various names [eg : yes@no, true@false , 1@2]
  3. The Boolean number "0" is for ON
  4. The Boolean number "1" is for OFF
  5. [eg : To make a printer undeleteable set "NoDeletePrinter" boolean to 1. That The value "NoDeletePrinter" will be activated]
Open RegEdit [start > run > "regedit"] and navigate to :

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\

Under "Explorer" subkey, this "DWORD" value can be created :
  1. NoDeletePrinter : Disables Deletion of Printers
  2. NoAddPrinter : Disables Addition of Printers
  3. NoRun : Disables Run Command
  4. NoSetFolders : Removes Folders from Settings on Start Menu
  5. NoSetTaskbar : Removes Taskbar from Settings on Start Menu
  6. NoFind : Removes the Find Command
  7. NoDrives : Hides Drives in My Computers
  8. NoNetHood : Hides the Network Neighborhood
  9. NoDesktop : Hides all icons on the Desktop
  10. NoLogoff : Hides the Log Off in the Start Menu
  11. NoRecentDocsMenu : Hides the Documents shortcut at the Start button
  12. DisableRegistryTools : Disable Registry Editing Tools
  13. NoChangeStartMenu : Disables changes to the Start Menu
  14. NoFileMenu : Hides the Files Menu in Explorer
  15. NoActiveDesktop : No Active Desktop
  16. NoFolderOptions : Hides the Folder Options in the Explorer
  17. ClearRecentDocsOnExit : Empty the recent Docs folder on reboot
  18. NoActiveDesktopChanges : No changes allowed
  19. NoInternetIcon : No Internet Explorer Icon on the Desktop
  20. NoFavoritesMenu : Hides the Favorites menu
  21. NoClose : Disables Shutdown
  22. NoRecentDocsHistory: Clears history of Documents
  23. NoSaveSettings : Don't save settings on exit
  24. NoControlPanel :Hide the control panel visibility
  25. NoCDBurning : Disable Cd burning
Under " System" subkey, this "DWORD" value can be created :
  1. NoDispCPL : Disable Display Control Panel
  2. NoPwdPage : Hide Password Change Page
  3. NoDispScrSavPage : Hide Screen Saver Page
  4. NoDispBackgroundPage : Hide Background Page
  5. NoSecCPL : Disable Password Control Panel
  6. NoDispAppearancePage : Hide Appearance Page
  7. NoDispSettingsPage : Hide Settings Page
  8. NoDevMgrPage : Hide Device Manager Page
  9. NoConfigPage : Hide Hardware Profiles Page
  10. NoVirtMemPage : Hide Virtual Memory Button
  11. NoAdminPage : Hide Remote Administration Page
  12. NoProfilePage : Hide User Profiles Page
  13. NoFileSysPage : Hide File System Button

Alternatively, if you want to create a string or edit it without opening Registry Editor, you can just fire up these string in the "run box" :
REG add HKCU\Software\Microsoft\Windows\CurrentVersion\
Policies\Explorer /v DisableRegistryTools /t REG_DWORD /d 0 /f
This can be more easier for you to add or change the value in the Registry Editor. In a long explanation :
  • REG ADD : adding a registry value
  • HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer : It will navigate through this value
  • /v DisableRegistryTools : It will create a value named "DisableRegistryTool". This can be change to your desired value that you want to create.
  • /t REG_DWORD : And the value created is a "DWORD" value type
  • 0 : The boolean is set to "0" [off]. "1" = [on]
  • /f : The data will be force overwritten without any

Create Your Own Password Protected Folder

Ever had a situation where you want to keep your file secretly. Avoid others from accessing your private data by your own application! Write the codes by yourself. In today how2.0 tutorial, i'll teach you a simple batch [*.bat] file programming, using only your notepad. This program runs under command prompt "CMD". Maybe it's too advance to learn this before you know about the basic of batch [*.bat] file itself. But nevermind, i'll explain the codes for your understanding. Yeah, lets rock the codes!! Here it is :

Step 1
Firstly, i'll explain about the method used in this batch [*.bat] program.

1st method :
Here, we'll use an unique method to create a folder that seen as "control panel". Magic? Yeah. This unique string : Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D} ,represent as "control panel" folder. So, if you rename any folder using this string, it will become a "control panel" but actually that is your folder. The is many more unique string such as:

  • Internet Explorer.{FBF23B42-E3F0-101B-8488-00AA003E56F8}
  • Recycle Bin.{645FF040-5081-101B-9F08-00AA002F954E}
  • My Computer.{20D04FE0-3AEA-1069-A2D8-08002B30309D}
  • My Documents.{ECF03A32-103D-11d2-854D-006008059367}
  • Fonts.{BD84B380-8CA2-1069-AB1D-08000948F534}
You can change the middle string such as, "MyOwnFolder.{21EC2020-3AEA-1069-A2DD-08002B30309D}". The folder will appear as "control panel" icon, named "MyOwnFolder", but you will also redirected to control panel folder. Thats means, your folder cannot be accessed as usual. The data inside the folder will remain safety.

2nd method :
We'll change the folder attributes to "system files attribute" and "hidden files attribute" by using "attrib" method that i've explain in my last post. [attrib x:/filename +s +h]

Step 2
Copy & Paste these codes into your notepad [start > run > "notepad"]. These codes combine the two method i've mention above to secure your folder.

cls
@ECHO OFF
title Folder Passworder [Beta Test] by zXara
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Locker goto MDLOCKER
:CONFIRM
echo Are you sure u want to Lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock folder
set/p "pass=>"
if NOT %pass%== password goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Locker
echo Locker created successfully
goto End
:End

[explanation]
  1. @ECHO OFF <<- the programs header
  2. title Folder Passworder [Beta Test] by zXara <<- your program title
  3. if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK <<- tell CMD to go to :UNLOCK path it the folder "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" is exist
  4. if NOT EXIST Locker goto MDLOCKER <<- tell the CMD to go to :MDLOCKER path if the folder "Locker" does'nt exist
  5. :CONFIRM <<- Command path
  6. echo Are you sure u want to Lock the folder(Y/N) <<- tell CMD to print out text "Are you sure u want to Lock the folder(Y/N)" on the screen
  7. set/p "cho=>" <<- Choice selection
  8. if %cho%==Y goto LOCK <<- tell CMD to go to :LOCK path if key Y was pressed
  9. if %cho%==y goto LOCK <<- tell CMD to go to :LOCK path if key y was pressed
  10. if %cho%==n goto END <<- tell CMD to go to :LOCK path if key n was pressed
  11. if %cho%==N goto END <<- tell CMD to go to :LOCK path if key N was pressed
  12. echo Invalid choice. <<- tell CMD to print out text "Invalid choice" on the screen
  13. goto CONFIRM <<- tell CMD to go to :CONFIRM path
  14. :LOCK <<- Command path
  15. ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" <<-CMD will rename the "locker" folder to "control panel"
  16. attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" <<- CMD will add "system" & "hidden" file attribute to the folder
  17. echo Folder locked <<- tell CMD to print out text "Folder locked" on the screen
  18. goto End <<- tell the CMD to go to :UNLOCK path
  19. :UNLOCK <<-Command path
  20. echo Enter password to Unlock folder <<- tell CMD to print out text "Enter password to Unlock folder" on the screen
  21. set/p "pass=>" <<- Choice selection
  22. if NOT %pass%== password goto FAIL <<-here it is, if the password is not "password", CMD will move to :FAIL path
  23. attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" <<- CMD will remove "system" & "hidden" file attribute to the folder
  24. ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker <<-CMD will rename the "control panel" folder to "locker"
  25. echo Folder Unlocked successfully <<- tell CMD to print out text "Folder Unlocked successfully " on the screen
  26. goto End< <- tell CMD to go to :END path
  27. :FAIL <<- Command path
  28. echo Invalid password <<- tell CMD to print out text "Invalid password" on the screen
  29. goto END <<- tell the CMD to go to :ENDpath
  30. :MDLOCKER <<- Command path
  31. md Locker <<- CDM will create "locker" folder
  32. echo Locker created successfully <<- tell CMD to print out text "Locker created successfully" on the screen
  33. goto END <<- tell the CMD to go to :END path
  34. :END <<- Command path
What a long explanation is'nt it.. huh.. I also burn my finger typing these post.. Hehe.. but it's my pleasure to share my knowledge with you all. :)
Ok, By simple explanation, you must change the "password" in line 22 to your own password. You can also change the title name in the 2nd line to your own. Hope you can find this tutorial useful, and, good luck coders :)

Step 3
Now you can save your file as anyfileneme.bat . You can put any name that you want as long as you keep the extension as *.bat. Now you can put your secret data inside the "locker" folder.
note that AVG will detect these commands as a HackTool. So, Make sure u make an exception list for this file to AVG. This why I hate AVG so much ~ daa

Monday, July 20, 2009

Attrib command ( Change attributes of a file or folder)

Displays, sets, or removes attributes assigned to files or directories. If used without parameters, attrib displays attributes of all files in the current directory.


Syntax

attrib [{+|-}r] [{+|-}a] [{+|-}s] [{+|-}h] [{+|-}i] [:][][] [/s [/d] [/l]]

Parameters

Parameter Description

{+|-}r

Sets (+) or clears (-) the Read-only file attribute.

{+|-}a

Sets (+) or clears (-) the Archive file attribute.

{+|-}s

Sets (+) or clears (-) the System file attribute.

{+|-}h

Sets (+) or clears (-) the Hidden file attribute.

{+|-}i

Sets (+) or clears (-) the Not Content Indexed file attribute.

[:][][]

Specifies the location and name of the directory, file, or group of files for which you want to display or change attributes. You can use the ? and * wildcard characters in the FileName parameter to display or change the attributes for a group of files.

/s

Applies attrib and any command-line options to matching files in the current directory and all of its subdirectories.

/d

Applies attrib and any command-line options to directories.

/l

Applies attrib and any command-line options to the Symbolic Link, rather than the target of the Symbolic Link.

/?

Displays help at the command prompt.

Remarks

  • You can use wildcard characters (? and *) with the FileName parameter to display or change the attributes for a group of files.
  • If a file has the System (s) or Hidden (h) attribute set, you must clear the attribute before you can change any other attributes for that file.
  • The Archive attribute (a) marks files that have changed since the last time they were backed up. Note that the xcopycommand uses archive attributes.

Examples

To display the attributes of a file named News86 that is located in the current directory, type:

attrib news86 

To assign the Read-only attribute to the file named Report.txt, type:

attrib +r report.txt 

To remove the Read-only attribute from files in the Public directory and its subdirectories on a disk in drive B, type:

attrib -r b:\public\*.* /s 

To set the Archive attribute for all files on drive A, and then clear the Archive attribute for files with the .bak extension, type:

attrib +a a:*.* & attrib -a a:*.bak 

With (native) Windows NT 4+ commands:

    NET LOCALGROUP Administrators

Or, to remove header and footer lines:


FOR /F "delims=[]" %%A IN ('NET LOCALGROUP Administrators ˆ| FIND /N "----"') DO SET HeaderLines=%%A
FOR /F "tokens=*" %%A IN ('NET LOCALGROUP Administrators') DO SET FooterLine=%%A
NET LOCALGROUP Administrators | MORE /E +%HeaderLines% | FIND /V "%FooterLine%"