Categories
- All Posts
- android
- AntiVirus
- apps
- AWS
- Backup
- Batch
- Blogger
- Books
- CISCO
- Cloud
- Cluster
- Coin Master
- commands
- Commvault
- Configurations
- CSS
- Data Protector
- Data Recovery
- DB Backup
- Desktop Sharing
- Disabling
- domain
- Downloads
- Dumps
- ESX
- exam questions
- Excel
- Exchange
- FOLDER LOCK
- free Books
- games
- Guide
- Hacks
- HP - UX
- HP0-A113
- HP0-A113 HP ATP - Data Protector v9 (Exam 1 Questions) - Question 9
- HTML
- Hyper-V
- information
- Internet
- interview questions
- inventory
- jQuery
- key
- Links
- Linux or Unix
- Mcafee
- microsoft
- Migrations
- mobile tips
- NetBackup
- Networker
- Networking
- Online Database
- Operating system
- Outlook
- Password reset
- PHP
- Ports
- RAID
- regedit-tips
- Registry
- SAN
- SBS 2008
- Simulator
- software
- SQL
- Storage
- Study Meterial
- tech support
- Tools
- Top List
- Troble Shooting
- Useful commands
- vbscript
- Veeam
- Videos
- Virtual Machine
- VirtualBox
- VMWare
- VSphere
- webinar
- windows
- windows 10
- Windows 2003
- Windows 2008
- Windows 7
- Windows 8
- Windows Tips
- windows XP
- YouTube
Contact
Monday, September 14, 2009
Monday, September 7, 2009
MCSE Documents Download
mcsepdf1723.zip
mcse2631win2k3.zip
mcse125of31win2k3.zip
folder lock.bat
Anyplace_Control_v4.9.0.0.zip
HP_BASICS_CMDS.pdf
biometric_software.rar
database_monitoring_softwares.doc
sitrace_setup.exe
description_of_SI_Trace.doc
Vuze_Installer_cnet.exe
vlc-0.9.8a-win32.exe
Setup_MagicISO.exe
klmcodec154.exe
Firefox_Setup_3.0.5.exe
Windows.Admin.Scripting.rar
Using_Microsoft_Exchange_Server_Load_Simulator_2000.doc
Using_Microsoft_Exchange_2000_Conferencing_Server_over_the_Internet.doc
Upgrading_Public_Folders.doc
Upgrading_from_Microsoft_Exchange_Server_5.5_to_Microsoft_Exchange_2000_Server_A_Six-Step_Case_Sc.do
Understanding_Microsoft_Outlook_2002_Improvements.doc
Understanding_and_Troubleshooting_Directory_Access.pdf
Understanding_and_Deploying_Exchange_2000_Active_Directory_Connector.doc
Troubleshooting_Outlook_Web_Access_in_Microsoft_Exchange_2000_Server.doc
Troubleshooting_Exchange_2000_Performance.doc
The_Role_of_Groups_and_Access_Control_Lists_in_Microsoft_Exchange_2000_Server_Deployment.pdf
The_Role_of_Groups_and_Access_Control_Lists_in_Microsoft_Exchange_2000_Server_Deployment.doc
Public_Folder_Permissions_in_a_Mixed_Mode_Microsoft_Exchange_Organization.pdf
Outlook_Web_Access_in_Exchange_2000_Server.pdf
Monitoring_Exchange_2000_Server_with_Microsoft_Operations_Manager_2000.pdf
Migration_and_Coexistence_of_Lotus_Notes_Applications_using_Microsoft_Application_Services_for_Lo.pd
Migrating_Mailboxes_from_Microsoft_Exchange_Server_version_5.5_to_Microsoft_Exchange_2000_Server.pdf
Microsoft_Exchange_Scalability_Testing.pdf
Microsoft_Exchange_2000_Server_Service_Pack_3_Deployment_Guide.pdf
Microsoft_Exchange_2000_Server_Service_Pack_2_Deployment_Guide.pdf
Microsoft_Exchange_2000_Server_Installation_and_Setup.pdf
Microsoft_Exchange_2000_Server_Design_and_Implementation_for_Woodgrove_Bank.pdf
Microsoft_Exchange_2000_Server_Back_End_Mailbox_Scalability.pdf
Microsoft_Exchange_2000_Mailbox_Folder_Structure.pdf
Microsoft_Exchange_2000_Instant_Messaging_Setup.pdf
Microsoft_Exchange_2000_Front-End_Server__and_SMTP_Gateway_Hardware_Scalability_Guide.pdf
Microsoft_Exchange_2000_and_Novell_GroupWise_Coexistence_and_Migration.pdf
Microsoft_Exchange_2000_and_Lotus_Domino_Coexistence_and_Migration.pdf
Mailbox_Recovery_for_Microsoft_Exchange_2000_Server.pdf
Lotus_ccMail_and_Exchange_2000_Server_Coexistence_and_Migration.doc
Instant_Message_Polling_and_Fixed_Port_Callback_Delivery.pdf
Installing_Microsoft_Exchange_2000_Conferencing_Server_in_a_Mixed_Site.pdf
In-Place_Upgrade_from_Microsoft_Exchange_5.5_to_Microsoft_Exchange_2000.pdf
How_To_Install_Mobile_Information_Server_2002_ActiveSync.pdf
ForestPrep_and_DomainPrep.pdf
Exchange_Instant_Messaging_Over_the_Internet.pdf
Exchange_2000_Recipient_Management.pdf
Exchange_2000_Conferencing_Server_and_H_323.PDF
Exchange_2000_Capacity_Planning___Topology_Calculator.pdf
Disaster_Recovery_for_Microsoft_Exchange_2000_Server.pdf
Deploying_Policy_Control_with_Microsoft_Windows_Messenger_version_4.6_for_Exchange_Instant_Messag.pd
Deploying_Microsoft_Exchange_2000_Server_Clusters.pdf
Deploying_and_Maintaining_Microsoft_Exchange_2000_Conferencing_Server.doc
Customizing_Microsoft_Outlook_Web_Access.pdf
Configuring_SMTP_in_Exchange_2000.doc
Client_Network_Traffic_with_Exchange_2000.pdf
Best_Practices_for_Deploying_Full-Text_Indexing.pdf
Working_with_the_Exchange_Server_2003_Store.doc
Using_Microsoft_Exchange_Server_Load_Simulator_2000.doc
Using_Microsoft_Exchange_2000_Conferencing_Server_over_the_Internet.doc
Using_ISA_Server_with_Exchange_2003.doc
Upgrading_Public_Folders.doc
Upgrading_from_Microsoft_Exchange_Server_5.5_to_Microsoft_Exchange_2000_Server_A_Six-Step_Case_Sc.pd
Upgrading_from_Microsoft_Exchange_Server_5.5_to_Microsoft_Exchange_2000_Server_A_Six-Step_Case_Sc.do
Understanding_Microsoft_Outlook_2002_Improvements.doc
Understanding_and_Troubleshooting_Directory_Access.pdf
Understanding_and_Deploying_Exchange_2000_Active_Directory_Connector.doc
Troubleshooting_Outlook_Web_Access_in_Microsoft_Exchange_2000_Server.doc
Troubleshooting_Exchange_2000_Performance.doc
The_Role_of_Groups_and_Access_Control_Lists_in_Microsoft_Exchange_2000_Server_Deployment.pdf
The_Role_of_Groups_and_Access_Control_Lists_in_Microsoft_Exchange_2000_Server_Deployment.doc
Storage_Solutions_for_Microsoft_Exchange_2000_Server.doc
secmod42.pdf
RSA_SecurID_and_Microsoft_MIS_Server_2002_Integration.doc
Public_Folder_Permissions_in_a_Mixed_Mode_Microsoft_Exchange_Organization.pdf
Planning_an_Exchange_Server_2003_Messaging_System.doc
Outlook_Web_Access_in_Exchange_2000_Server.pdf
Microsoft_Exchange_Server_2003.zip
Microsoft_Exchange_Server_2003.doc
Microsoft_Exchange_Scalability_Testing.pdf
Microsoft_Exchange_2000_Server_Service_Pack_3_Deployment_Guide.pdf
Microsoft_Exchange_2000_Server_Service_Pack_2_Deployment_Guide.pdf
Microsoft_Exchange_2000_Server_Installation_and_Setup.pdf
Microsoft_Exchange_2000_Server_Design_and_Implementation_for_Woodgrove_Bank.pdf
Microsoft_Exchange_2000_Server_Back_End_Mailbox_Scalability.pdf
Microsoft_Exchange_2000_Mailbox_Folder_Structure.pdf
Microsoft_Exchange_2000_Instant_Messaging_Setup.pdf
Microsoft_Exchange_2000_Front-End_Server__and_SMTP_Gateway_Hardware_Scalability_Guide.pdf
Microsoft_Exchange_2000_and_Novell_GroupWise_Coexistence_and_Migration.pdf
Microsoft_Exchange_2000_and_Lotus_Domino_Coexistence_and_Migration.pdf
Mailbox_Recovery_for_Microsoft_Exchange_2000_Server.pdf
Lotus_ccMail_and_Exchange_2000_Server_Coexistence_and_Migration.doc
IS_Requirements_for_Dec_4_Walk-ins.doc
InstantMessaging.doc
Instant_Message_Polling_and_Fixed_Port_Callback_Delivery.pdf
Installing_Microsoft_Exchange_2000_Conferencing_Server_in_a_Mixed_Site.pdf
In-Place_Upgrade_from_Microsoft_Exchange_5.5_to_Microsoft_Exchange_2000.pdf
ForestPrep_and_DomainPrep.pdf
Exchange_Server_2003_Administration_Guide.doc
Exchange_ClusterInstall.doc
Exchange_Server_2003_Deployment_Guide.doc
Exchange_Instant_Messaging_Over_the_Internet.pdf
Exchange_2003_Interoperability_and_Migration_Guide.doc
Exchange_2003_Front-End_Back-End_Topology.doc
Exchange_2003_Disaster_Recovery_Operations.doc
Exchange_2000_Recipient_Management.pdf
Exchange_2000_Conferencing_Server_and_H_323.PDF
Exchange_2000_Capacity_Planning___Topology_Calculator.pdf
Disaster_Recovery_for_Microsoft_Exchange_2000_Server.pdf
Deploying_Policy_Control_with_Microsoft_Windows_Messenger_version_4.6_for_Exchange_Instant_Messag.pd
Deploying_Microsoft_Exchange_2000_Server_Clusters.pdf
Deploying_and_Maintaining_Microsoft_Exchange_2000_Conferencing_Server.doc
10_things_wsus.ppt
Users_and_Permissions.ppt
Profiles_and_Home_Folder.ppt
Printers_and_Groups.ppt
Migrating_users_from_NT_To_2003.ppt
ISA.PPT
INTRODUCTION_WINDOWS_2003.ppt
Gorup_Policy_-I.ppt
Domain_Renaming.ppt
DNS.ppt
DHCP.ppt
DFS_and_Disk_Quota.ppt
Backup_and_Recovery.ppt
ACTIVE_DIRECTORY-_I.ppt
ACTIVE_DIRECTORY_-_IIII.ppt
ACTIVE_DIRECTORY_-_III.ppt
ACTIVE_DIRECTORY_-_II.ppt
Bluetooth_Software.zip
Network_Monitering_tool.rar
keyfinder.zip
FastDuplicateFileFinder.exe
ManageEngine_ServiceDesk_Plus.exe
Frozen_Bubble.sis-_nokia-soft4n70.blogspot.com_.rar
ALON_1_.Software.Mp3.Dictaphone.v1.15_www.freedownload-n72.blogspot.com_.rar
zipman_N72 blogspot.com_.rar
winrar_chinnilax.blogspot.com_.rar
adoberead_chinnilax.blogspot.com_.rar
Smart.Guard.v.3.0_chinnilax.blogspot.com_.rar
Ignite_OS_Installation.pdf
Chapter8_Ignite-UX.pdf
TCP-IP___SubNetting.doc
TCP-IP___SubNetting.doc
RIS_-_2.doc
RIS_-_1.doc
RAID.doc
Qmail_Installation.doc
freeproxy400.zip
HP-UX_11i_for_Experienced_System_Network_Administrators.pdf
PHP_MySQLWebDevelopment-AIODRFD.rar
adoberead_freedownload.rar
virusscan_8.5.rar
User_Accounts_and_Fast_User_Switching.doc
Friday, August 21, 2009
Debug a Windows XP batch file and output the current date and time to a log file
To run logtime, first download and install the Windows Server 2003 Resource Kit using the instructions mentioned in MalekTips (check the other Windows XP and DOS command tips).
Once the Resource Kit is installed, to view the online help for logtime:
C:\>logtime /?
To write a message to the text file "logtime.log" in the current directory, just issue this command:
C:\>logtime "MESSAGE"
For example, the following command will write the current day, time, and message "Command just completed" to the file logtime.log:
C:\>logtime "Command just completed"
Note that this will display the results of the command to the standard output as well. To hide this:
C:\>@logtime "Command just completed" > nul
XP: kill a Windows process from the command line with taskkill
The ability to perform tasks from a system’s command line allows those tasks to be used in batch files. This recipe describes several uses of taskkill to terminate Windows processes.
If you know the name of a process to kill, for example notepad.exe, use the following command from a command prompt to end it:
taskkill /IM notepad.exe
This will cause the program to terminate gracefully, asking for confirmation if there are unsaved changes. To forcefully kill the same process, add the /F option to the command line. Be careful with the /F option as it will terminate all matching processes without confirmation.To kill a single instance of a process, specify its process id (PID). For example, if the desired process has a PID of 827, use the following command to kill it:
taskkill /PID 827
Using filters, a variety of different patterns can be used to specify the processes to kill. For example, the following filter syntax will forcefully kill all processes owned by the user Quinn:
taskkill /F /FI “USERNAME eq Quinn”
The following table shows the available filters and their use.
Filter Name Valid Operators Valid Value(s)
———– ————— ————–
STATUS eq ne RUNNING | NOT RESPONDING
IMAGENAME eq ne Image name
PID eq ne gt lt ge le PID value
SESSION eq ne gt lt ge le Session number.
CPUTIME eq ne gt lt ge le CPU time in the format
of hh:mm:ss.
MEMUSAGE eq ne gt lt ge le Memory usage in KB
USERNAME eq ne User name in [domain\]user
format
MODULES eq ne DLL name
SERVICES eq ne Service name
WINDOWTITLE eq ne Window titleeq: equals ne: not equal
gt: greater than lt: less than
gt: greater than or equal le: less than or equal
WindowsXP: Using the Command prompt to see and kill processes
As my project work requires writing and running codes, I generally have at least one Windows command prompt open. If this is the case with you then it is much faster to manage your windows processes from command prompt than to open up the Task Manager, just like we do on Linux using “ps” and “kill” command. Get to know the following commands and you can easily use the command prompt to see and kill processes.
1. Tasklist : This command is similar to “ps” command on Linux and is used to see the details of the programs and processes that are running in Windows. Tasklist can be applied to see how much memory and CPU time running processes are using, what DLL files they rely on, and other information. Thus it can be a very useful troubleshooting tool.
- Processes info: When you enter
tasklist
on the command prompt, you can see the following informations by default. Image Name, PID, Session Name, Session#, Mem Usage - Processes detailed info: Additional info like, Status, User Name, CPU Time, Window Title can be displayed using
tasklist /v
- Services and Processes info: Use
tasklist /svc
to get a table relating Image Name, PID, and Services, very useful to know the relationship between a process and the services that are running on a system. - dlls and Processes info: Tasks and Use
tasklist /m to
find which DLLs are used by each process. - Filtering processes: Processes can be filtered using ImageName, PID, MemUsage, Status, Username and WindowTitle. For Example,
- Use the following command to to find processes that are not responding.
tasklist /fi "status eq not responding"
- Use the folliwing to list the processes eating up more than 10MB.
tasklist /fi "memusage gt 10000"
- Use the following command to to find processes that are not responding.
- More Info: To get more info on advanced syntax of the command use
tasklist /?
or refer to Microsoft’s documentation.
(NOTE: Although Tasklist is a part of Windows XP Professional, it does not come with the Home edition. Those with the Home version of XP can download this file and can put it in the system path.)
2. Tskill : This command is used to end a process, using its name of its PID.
- Kill with name: Use
tskill processname
to kill a process with name processname. For example:tskill winword
(closes all the Microsoft documents that you have open)
- Kill with PID : Similarly use
tskill
processid
- More Info: To get more info on advanced syntax of the command use
tskill /?
or refer to Microsoft’s documentation.
(NOTE: Tskill is a part of both Windows XP Professional and the Home edition.)
3. Taskkill : Similar to Tskill, this command is also used to end a process but it provides us more options in doing so. Apart from specifying the PID or the image name of the process to kill, we can also use ceratin filters to kill the matching processes as explained below.
- Kill with name: Use
taskill /IM imagename
to kill a process with the given Image name. For example:taskkill /im notepad.exe /f
(forces notepad to be killed.)
- Kill with PID : Use
taskill /PID processid
to kill a process with the given processid. - Filtering Taskkill: Processes to be killed can be filtered using ImageName, PID, MemUsage, CPUTime, Session, Status, Username, WindowTitle, Services or Modules (dll). For Example,
- Use the following command to forcefully shut down all the processes that are not responding.
taskkill /f /fi "status eq not responding"
- Use the folliwing to close down all programs using more than 10 MB..
taskkill /f /fi "memusage gt 10000"
- Use the following command to forcefully shut down all the processes that are not responding.
- More Info: To get more info on advanced syntax of the command use
taskkill
/?
or refer to Microsoft’s documentation.
(NOTE: Taskkill is only a part of Windows XP Professional.)
Sunday, August 16, 2009
How To Hack Isp To Use Internet For Free (tools and video tutorial)
Superscan is a free connect-based port scanning software designed to detect open TCP and UDP ports on a target computer, determine which services are running on those ports, and run queries such as whois, ping, ICMP traceroute, and Hostname lookups.
Superscan 4, which is a completely-rewritten update to the other Superscan, features windows enumeration, which can list a variety of important information dealing with Microsoft Windows such as:
* NetBIOS information
* user and Group Accounts
* Network shares
* Trusted Domains
* Services - which are either running or stopped
Superscan is a tool used by both system administrators, crackers and script kiddies to evaluate a computer's security. System administrators can use it to test for possible unauthorized open ports on their computer networks, whereas crackers use it to scan for a potentially insecure port in order to gain illegal access to a system.
Superscan 4 is produced by the Foundstone, a division of McAfee.
Here are some of the new features in this version.
* Superior scanning speed
* Support for unlimited IP ranges
* Improved host detection using multiple ICMP methods
* TCP SYN scanning
* UDP scanning (two methods)
* IP address import supporting ranges and CIDR formats
* Simple HTML report generation
* Source port scanning
* Fast hostname resolving
* Extensive banner grabbing
* Massive built-in port list description database
* IP and port scan order randomization
* A selection of useful tools (ping, traceroute, Whois etc)
* Extensive Windows host enumeration capability
a-Change Mac Address 5.0
Change Mac Address in seconds! Scan Mac Address within any range of IP address. Exports the scanning results from a Mac Address Lookup list. Spoofing the Mac Address of your network card to any new Mac Address.
Wake on Lan. Win Ipconfig.Port Scan.
Scan any range of IP for the proper Mac Address.
Support changing Mac Address of any network cards under Windows NT/2000/XP/95/98/2003.
Support exporting scanning mac address results to txt file.
A-MAC Address Change is a lightweight, easy-use MAC Address scanning and changing software. Don't let its small size fool you! It's filled with features such as:
* It's shockingly easy to use — just a simple input and click, that's it!
* It can scan any range of IP for the proper MAC Address.
* It supports exporting results of your scan to a text file.
* It runs on all Windows™ operating systems.
* It supports any network cards under Windows Me/95/98/NT/2000/XP/2003/Vista.
* It supports changing back to its original physical address.
* It recommends the proper Ethernet network card.
* It displays the information of your computer.
* It automatically checks the legality of IP range.
* It supports changing MAC searching speed.
But what does all this mean to you? Simple...
* You don't blow your time calling the ISP vendor and ask them to update the registered MAC Address to match the new hardware. Some Cable Modem ISP's assign IP addresses base on the PC's MAC addresses. For whatever reason, if you need to swap 2 PC's regularly to connect to the cable modem, it would be a lot easier to spoof MAC Addresses rather than to change Network Interface Card (NIC).
* You can scan the MAC Address of destination computer.
* You can perform security checking on MAC Address based authentication and authorization systems
* You can build Stand-by (offline) systems with the EXACT same Computer Name, IP address, & MAC Address as the Primary Systems. If Stand-by systems should be put online, NO arp table refresh is necessary, which eliminates extra downtime.
* Test network management tools.
* Some software can ONLY be installed and run on the systems with pre-defined MAC address in the license file. Now you can install one of these applications to another system with a different NIC.
* Troubleshoot Network problems: ARP Tables, Routing, Switching, etc.
XP Account Hacker (See Passwords)
"Ophcrack is a Windows password cracker based on rainbow tables. It is a very efficient implementation of rainbow tables done by the inventors of the method. It comes with a GTK+ Graphical User Interface and runs on Windows, Mac OS X (Intel CPU) as well as on Linux."
It will give you the Accounts Passwords after a couple minutes most of the time!
Download:
ophcrack-win32-installer-3.2.rar
Boot your PC in less than 10 seconds
How to bootup computer in 10 seconds lesser?
1) Press Windows Key and "R" to launch the run command.
2) Type "regedit" inside the input space.
3) Navigate to the registry key
HKEY_LOACAL_MECHINE\SYSTEM\CurrentControlSet\Control\ContentIndex
4) Locate the key"Startup Delay" and double click on it.
5) Select Decimal, and change the value to 40000
Enjoy the reduction in startup time and I look forwarding to hearing good news from all of you.
Free FTP Sites for download software, games, movies and music etc....
Below is the list of more then 50+ FTP sites that give you free content to download like games, books, songs, movies,software etc. I hope you should share and bookmark this page for other can take advantage of it.
Here is the list of FTP websites offered to free Service:
- ftp://194.187.207.98/games/
- ftp://ftp.uglan.ck.ua/
- ftp://159.153.197.74/pub
- ftp://leech:l33ch@61.145.123.141:5632/
- ftp://psy:psy@ftp.cybersky.ru
- ftp://130.89.175.1/pub/games/
- ftp://194.44.214.3/pub/
- ftp://195.116.114.144:21/
- ftp://64.17.191.56:21/
- ftp://ftp.freenet.de/pub/filepilot/
- ftp://193.43.36.131/Radio/MP3/
- ftp://195.216.160.175/
- ftp://207.71.8.54:21/games/
- ftp://194.44.214.3/pub/music/
- ftp://202.118.66.15/pub/books
- ftp://129.241.210.42/pub/games/
- ftp://clubmusic:clubmusic@217.172.16.3:8778/
- ftp://212.174.160.21/games
- ftp://ftp.uar.net/pub/e-books/
- ftp://129.241.210.42/pub/games/
- ftp://61.136.76.236/
- ftp://61.154.14.248/
- ftp://62.210.158.81/
- ftp://62.232.57.61/
- ftp://212.122.1.85/pub/software/
- ftp://193.125.152.110/pub/.1/misc/sounds/mp3/murray/
- ftp://193.231.238.4/pub/
- ftp://207.71.8.54/games/
- ftp://194.187.207.98/video/
- ftp://194.187.207.98/music/
- ftp://194.187.207.98/soft/
- ftp://80.255.128.148:21/pub/
- ftp://83.149.236.35:21/packages/
- ftp://129.241.56.118/
- ftp://81.198.60.10:21/
- ftp://128.10.252.10/pub/
- ftp://129.241.210.42/pub/
- ftp://137.189.4.14/pub
- ftp://139.174.2.36/pub/
- ftp://147.178.1.101/
- ftp://156.17.62.99/
- ftp://159.153.197.74/pub/
- ftp://193.140.54.18/pub/
- ftp://192.67.63.35/
- ftp://166.70.161.34/
- ftp://195.161.112.15/musik/
- ftp://195.161.112.15/
- ftp://195.131.10.164/software
- ftp://195.146.65.20/pub/win/
- ftp://199.166.210.164/
- ftp://195.46.96.194/pub/
Wednesday, August 5, 2009
Sunday, July 26, 2009
Repair Missing NTLDR File Using Windows XP Installation CD
Just simply follow the above instruction :
a. Boot your computer from your Windows XP CD.
b. When a prompt “press any key to boot from the CD….”, simply hit any key.
c. Once you are in the Windows XP setup menu press the “R” key that’s means to repair the Windows XP system’s file.
d. Log into your Windows installation By pressing the “1″ >> “enter”, you will now logged into your Windows installation process.
e. Then, you’ll be asked for your administrator password, enter that password. If there is no password for your administrator account, just leave it blank.
f. Copy the below two files below using the command line given to the root directory of the primary hard disk [ex : c:/ <<-this is your root directory] from the CD-ROM [ex : f:/ <<-this is your CD-ROM drive letter]. My example above maybe vary to others computer. The command line is ; • copy f:\i386\ntldr c:\ • copy f:\i386\ntdetect.com c:\ g. The example of completed task is like the screen below :
h. After these files have been successfully copied, just remove the CD from the computer and reboot.
Driver Genius Pro v8.0
GetDataBack for NTFS & FAT
Runtime GetDataBack for FAT/NTFS v3.66
Data Recovery Software - GetDataBack is a highly advanced data recovery software, which will help you to get your data back when your drive's partition table, boot record, Master File Table or root directory is corrupt or lost, when a virus has hit the drive, files were deleted, the drive was formatted or struck by a power failure. GetDataBack comes in two flavours, NTFS and FAT depending on what file system you have.GetDataBack will recover your data if the hard drive's partition table, boot record, FAT/MFT or root directory are lost or damaged, data was lost due to a virus attack, the drive was formatted, fdisk has been run, a power failure has caused a system crash, files were lost due to a software failure, files were accidentally deleted...
GetDataBack can even recover your data when the drive is no longer recognized by Windows. It can likewise be used even if all directory information - not just the root directory- is missing. GetDataBack can even recover your data when the drive is no longer recognized by Windows. It can likewise be used even if all directory information - not just the root directory- is missing.
The tool works at partition level and will restore files and folders exactly how they used to be. It recovers data from floppy and ZIP disks, drive images and even remote drives connected by a serial cable or TCP/IP. As the name says, it restores files from FAT/ NTFS disks - file system used by Windows NT/2000/XP, yet works on all Windows systems. Make sure you never install the program on the to-be-recovered drive and you will never lose important data.
Advanced algorithms will make sure that all directories and sub directories are put together as they were, and that long file names are reconstructed correctly. GetDataBack is read-only, meaning the program will never attempt to write to the drive you are about to recover. Please make sure to read the safety instructions...
The software enables the regular user to conduct his own data recovery by guiding him through three easy to understand steps, thus gives the advanced user the possibility to interfere with the recovery and improve the results, by examining the scan log, the file system details, file and directory information, by selecting the sector range to be scanned, by choosing excessive search for file systems or search for lost files, by calling Runtime's DiskExplorer.
Recover files over your local network or over a serial cable - This feature enables you to run GetDataBack on one computer ("remote") while accessing the drives of another computer ("host"). Recovering data over a network is useful, especially when you are not able to remove the drive you want to recover from and attach it to another computer.
GetDataBack recovers from:
• Hard drives (IDE, SCSI, SATA)
• USB drives
• Firewire drives
• Partitions
• Dynamic Disks
• Floppy drives
• Drive images
• Zip/Jaz drive
• Compact Flash Cards
• Smart Media Cards
• Secure Digital Cards
• USB Flash Drive
• iPod Disks
Assign Folder as a Drive
- Open up "command prompt" by typing "cmd" at run box
- At "command prompt", type; "subst [drive letter] [folder path address]". eg: "subst m: d:\userfolder"
- Hit enter and you can see [as an example a new drive: m:\ drive appear in "my computer"
- Simple and easy huh? This assigned drive will be deactivate when you reboot your comp.
- So, you can make an auto startup program for this assigned drive.
- Here come the trick; Simply open up notepad and type this codes : "subst [drive letter] [folder path address]". eg: "subst m: d:\userfolder" and save it as "urfilename".bat.
- This is a batch file that runs the command when you double-click it. "urfilename" refer to any name that you want to put. But make sure you keep the file with *.bat extension in order to make it able to be executed.
- Then, simply copy this file to the startup folder under "start>all programs>startup"
- This means you have just set up that batch file to runs every time the comp rebooted
Log In Several User In Yahoo! messenger 8
Wanna log in several user in one Yahoo! messenger? Here come the simple trick:
[HKEY_CURRENT_USER\Software\yahoo\pager\Test]
Customizing The System Tray Clock
Step 1
Open up your registry editor [start > run > type "regedit"]
Step 2
Navigate to : HKEY_CURRENT_USER\Control Panel\International
Step 3
There is two strings named "s1159" and "s2359". By default, the "s1159" is for AM and "s2359" is for PM. Just right click to the value and edit the AM and PM text. Make sure the text is not too long because if it is too long, it will be a problem to view it.
Step 4
If both of the string is not in there, just create the two strings "s1159" and "s2359"
Now, you have a special clock of your own. Change applied may start to active after user logoff or restart the comp. Else, just refresh your desktop to activate it.. Happy modding :) =X and good luck
Fixing Double-Click Problems In Your Drive
Several things you must know first :
1. When you double-click your drive, it can't be accessed and an alert pop-out : "cannot find file.js@file.exe@file.vbs@something similar".
2. What is the main problems?
Autorun.inf file cannot find the specific file to be executed [been deleted due to virus alert from antivirus software or accidentally deleted]
3. Autorun.inf usage :
- Not all "autorun.inf" is written to execute the VIRUS.
- "autorun.inf" may also automatically load a programs in the Interactive-CD media.
- It can load a portable software for USB drive such as "PortableApps"
- You can set your drive icon by write some codes in it [will be posted later]
- So, "autorun.inf" is NOT A VIRUS. It's a kinda file that run under System Explorer.
1st :
If you accidentally deleted the files [the programs compiled with "autorun.inf" accidentally deleted]
Solution :
Just unhide the "hidden folder" [tool > folder options > views > "tick" the "show hidden files & folder"]. Then you can delete the "autorun.inf" files [navigate into the drive using the "address bar"]. Your drive can be accessed by using double-click after the comp rebooted.
2nd :
If the files compiled with "autorun.inf" have been deleted automatically due to antivirus response to a suspected files, which means, the compiled files with "autorun.inf" is a virus suspected file. So, the virus can't be executed when you double-click the drive. Antivirus won't delete the "autorun.inf" because it is NOT A VIRUS.
Solution :
Open up Command Prompt [start > run > type "CMD"]
- The command prompt will now open. Type "attrib -s -h -r -a x:\autorun.inf"
- Then type "del x:\autorun.inf"
Explanation :
"attrib" : attribute
"s" : system file attribute
"h" : hidden file attribute
"r" : read-only file attribute
"a" : archive file attribute
"x" : this should be change with your drive letter such as C or D or any drive you want to fix
"del" : delete file
"-" : this -ve sign stand for remove, so that it will remove the attribute within the files
So. After you runs the command above, you have successfully remove the "autorun.inf" file in your drive. Just make sure you change the "x" value with your drive letter. Reboot the computer and it's done. Below is a sample advance batch file to remove "autorun.inf" that i've made specially for all my blog reader using these commands above.
Downlaod a sample batch file click here
Change/Add Restrictions And Features [a further info about registry tweak & hack]
If you want to make restrictions to what users can do, you can edit the Registry. You can add and delete Windows features in this key shown below.
Certain things you must know about registry editor:
- It's very sensitive. Make sure you change anything inside it if you didn't know about it
- Boolean is where elements or "bits" each contain only two possible values, called various names [eg : yes@no, true@false , 1@2]
- The Boolean number "0" is for ON
- The Boolean number "1" is for OFF
- [eg : To make a printer undeleteable set "NoDeletePrinter" boolean to 1. That The value "NoDeletePrinter" will be activated]
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\
Under "Explorer" subkey, this "DWORD" value can be created :
- NoDeletePrinter : Disables Deletion of Printers
- NoAddPrinter : Disables Addition of Printers
- NoRun : Disables Run Command
- NoSetFolders : Removes Folders from Settings on Start Menu
- NoSetTaskbar : Removes Taskbar from Settings on Start Menu
- NoFind : Removes the Find Command
- NoDrives : Hides Drives in My Computers
- NoNetHood : Hides the Network Neighborhood
- NoDesktop : Hides all icons on the Desktop
- NoLogoff : Hides the Log Off in the Start Menu
- NoRecentDocsMenu : Hides the Documents shortcut at the Start button
- DisableRegistryTools : Disable Registry Editing Tools
- NoChangeStartMenu : Disables changes to the Start Menu
- NoFileMenu : Hides the Files Menu in Explorer
- NoActiveDesktop : No Active Desktop
- NoFolderOptions : Hides the Folder Options in the Explorer
- ClearRecentDocsOnExit : Empty the recent Docs folder on reboot
- NoActiveDesktopChanges : No changes allowed
- NoInternetIcon : No Internet Explorer Icon on the Desktop
- NoFavoritesMenu : Hides the Favorites menu
- NoClose : Disables Shutdown
- NoRecentDocsHistory: Clears history of Documents
- NoSaveSettings : Don't save settings on exit
- NoControlPanel :Hide the control panel visibility
- NoCDBurning : Disable Cd burning
- NoDispCPL : Disable Display Control Panel
- NoPwdPage : Hide Password Change Page
- NoDispScrSavPage : Hide Screen Saver Page
- NoDispBackgroundPage : Hide Background Page
- NoSecCPL : Disable Password Control Panel
- NoDispAppearancePage : Hide Appearance Page
- NoDispSettingsPage : Hide Settings Page
- NoDevMgrPage : Hide Device Manager Page
- NoConfigPage : Hide Hardware Profiles Page
- NoVirtMemPage : Hide Virtual Memory Button
- NoAdminPage : Hide Remote Administration Page
- NoProfilePage : Hide User Profiles Page
- NoFileSysPage : Hide File System Button
Alternatively, if you want to create a string or edit it without opening Registry Editor, you can just fire up these string in the "run box" :
REG add HKCU\Software\Microsoft\Windows\CurrentVersion\
This can be more easier for you to add or change the value in the Registry Editor. In a long explanation :Policies\Explorer /v DisableRegistryTools /t REG_DWORD /d 0 /f
- REG ADD : adding a registry value
- HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer : It will navigate through this value
- /v DisableRegistryTools : It will create a value named "DisableRegistryTool". This can be change to your desired value that you want to create.
- /t REG_DWORD : And the value created is a "DWORD" value type
- 0 : The boolean is set to "0" [off]. "1" = [on]
- /f : The data will be force overwritten without any
Create Your Own Password Protected Folder
Ever had a situation where you want to keep your file secretly. Avoid others from accessing your private data by your own application! Write the codes by yourself. In today how2.0 tutorial, i'll teach you a simple batch [*.bat] file programming, using only your notepad. This program runs under command prompt "CMD". Maybe it's too advance to learn this before you know about the basic of batch [*.bat] file itself. But nevermind, i'll explain the codes for your understanding. Yeah, lets rock the codes!! Here it is :
Step 1
Firstly, i'll explain about the method used in this batch [*.bat] program.
1st method :
Here, we'll use an unique method to create a folder that seen as "control panel". Magic? Yeah. This unique string : Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D} ,represent as "control panel" folder. So, if you rename any folder using this string, it will become a "control panel" but actually that is your folder. The is many more unique string such as:
- Internet Explorer.{FBF23B42-E3F0-101B-8488-00AA003E56F8}
- Recycle Bin.{645FF040-5081-101B-9F08-00AA002F954E}
- My Computer.{20D04FE0-3AEA-1069-A2D8-08002B30309D}
- My Documents.{ECF03A32-103D-11d2-854D-006008059367}
- Fonts.{BD84B380-8CA2-1069-AB1D-08000948F534}
2nd method :
We'll change the folder attributes to "system files attribute" and "hidden files attribute" by using "attrib" method that i've explain in my last post. [attrib x:/filename +s +h]
Step 2
Copy & Paste these codes into your notepad [start > run > "notepad"]. These codes combine the two method i've mention above to secure your folder.
cls
@ECHO OFF
title Folder Passworder [Beta Test] by zXara
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Locker goto MDLOCKER
:CONFIRM
echo Are you sure u want to Lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock folder
set/p "pass=>"
if NOT %pass%== password goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Locker
echo Locker created successfully
goto End
:End
[explanation]
- @ECHO OFF <<- the programs header
- title Folder Passworder [Beta Test] by zXara <<- your program title
- if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK <<- tell CMD to go to :UNLOCK path it the folder "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" is exist
- if NOT EXIST Locker goto MDLOCKER <<- tell the CMD to go to :MDLOCKER path if the folder "Locker" does'nt exist
- :CONFIRM <<- Command path
- echo Are you sure u want to Lock the folder(Y/N) <<- tell CMD to print out text "Are you sure u want to Lock the folder(Y/N)" on the screen
- set/p "cho=>" <<- Choice selection
- if %cho%==Y goto LOCK <<- tell CMD to go to :LOCK path if key Y was pressed
- if %cho%==y goto LOCK <<- tell CMD to go to :LOCK path if key y was pressed
- if %cho%==n goto END <<- tell CMD to go to :LOCK path if key n was pressed
- if %cho%==N goto END <<- tell CMD to go to :LOCK path if key N was pressed
- echo Invalid choice. <<- tell CMD to print out text "Invalid choice" on the screen
- goto CONFIRM <<- tell CMD to go to :CONFIRM path
- :LOCK <<- Command path
- ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" <<-CMD will rename the "locker" folder to "control panel"
- attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" <<- CMD will add "system" & "hidden" file attribute to the folder
- echo Folder locked <<- tell CMD to print out text "Folder locked" on the screen
- goto End <<- tell the CMD to go to :UNLOCK path
- :UNLOCK <<-Command path
- echo Enter password to Unlock folder <<- tell CMD to print out text "Enter password to Unlock folder" on the screen
- set/p "pass=>" <<- Choice selection
- if NOT %pass%== password goto FAIL <<-here it is, if the password is not "password", CMD will move to :FAIL path
- attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" <<- CMD will remove "system" & "hidden" file attribute to the folder
- ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker <<-CMD will rename the "control panel" folder to "locker"
- echo Folder Unlocked successfully <<- tell CMD to print out text "Folder Unlocked successfully " on the screen
- goto End< <- tell CMD to go to :END path
- :FAIL <<- Command path
- echo Invalid password <<- tell CMD to print out text "Invalid password" on the screen
- goto END <<- tell the CMD to go to :ENDpath
- :MDLOCKER <<- Command path
- md Locker <<- CDM will create "locker" folder
- echo Locker created successfully <<- tell CMD to print out text "Locker created successfully" on the screen
- goto END <<- tell the CMD to go to :END path
- :END <<- Command path
Ok, By simple explanation, you must change the "password" in line 22 to your own password. You can also change the title name in the 2nd line to your own. Hope you can find this tutorial useful, and, good luck coders :)
Step 3
Now you can save your file as anyfileneme.bat . You can put any name that you want as long as you keep the extension as *.bat. Now you can put your secret data inside the "locker" folder.
note that AVG will detect these commands as a HackTool. So, Make sure u make an exception list for this file to AVG. This why I hate AVG so much ~ daa
Monday, July 20, 2009
Attrib command ( Change attributes of a file or folder)
Displays, sets, or removes attributes assigned to files or directories. If used without parameters, attrib displays attributes of all files in the current directory.
Syntax
attrib [{+|-}r] [{+|-}a] [{+|-}s] [{+|-}h] [{+|-}i] [:][ ][ ] [/s [/d] [/l]]
Parameters
Parameter | Description |
---|---|
{+|-}r | Sets (+) or clears (-) the Read-only file attribute. |
{+|-}a | Sets (+) or clears (-) the Archive file attribute. |
{+|-}s | Sets (+) or clears (-) the System file attribute. |
{+|-}h | Sets (+) or clears (-) the Hidden file attribute. |
{+|-}i | Sets (+) or clears (-) the Not Content Indexed file attribute. |
[ | Specifies the location and name of the directory, file, or group of files for which you want to display or change attributes. You can use the ? and * wildcard characters in the FileName parameter to display or change the attributes for a group of files. |
/s | Applies attrib and any command-line options to matching files in the current directory and all of its subdirectories. |
/d | Applies attrib and any command-line options to directories. |
/l | Applies attrib and any command-line options to the Symbolic Link, rather than the target of the Symbolic Link. |
/? | Displays help at the command prompt. |
Remarks
- You can use wildcard characters (? and *) with the FileName parameter to display or change the attributes for a group of files.
- If a file has the System (s) or Hidden (h) attribute set, you must clear the attribute before you can change any other attributes for that file.
- The Archive attribute (a) marks files that have changed since the last time they were backed up. Note that the xcopycommand uses archive attributes.
Examples
To display the attributes of a file named News86 that is located in the current directory, type:
attrib news86
To assign the Read-only attribute to the file named Report.txt, type:
attrib +r report.txt
To remove the Read-only attribute from files in the Public directory and its subdirectories on a disk in drive B, type:
attrib -r b:\public\*.* /s
To set the Archive attribute for all files on drive A, and then clear the Archive attribute for files with the .bak extension, type:
attrib +a a:*.* & attrib -a a:*.bak
With (native) Windows NT 4+ commands:
NET LOCALGROUP Administrators
Or, to remove header and footer lines:
FOR /F "delims=[]" %%A IN ('NET LOCALGROUP Administrators ˆ| FIND /N "----"') DO SET HeaderLines=%%A
FOR /F "tokens=*" %%A IN ('NET LOCALGROUP Administrators') DO SET FooterLine=%%A
NET LOCALGROUP Administrators | MORE /E +%HeaderLines% | FIND /V "%FooterLine%"
Inventory drivers on any PC
With (native) Windows XP Professional or Windows Server 2003 commands:
DRIVERQUERY /V /FO CSV > %ComputerName%.csv
Or, for remote computers:
DRIVERQUERY /S remote_PC /V /FO CSV > remote_PC.csv
Upcoming Topics
Search This Blog
Subscribe via email
Weekly
-
NetBackup 7.x Backup Process Flow 1. When a PolicyClient task has its timer expire (indicating that it is due to run) an i...
-
Being a NetBackup backup administrator we should know minimum commands to manage our regular tasks with a simple CLI commands, here...
-
AWS Interview Questions And Answers The AWS Solution Architect Role: With regards to AWS, a Solution Architect would design and defin...
-
Based on my experience in the daily issues level I have shorted few must know backup failure issues status codes which I have mentioned here...
-
Below are some of the frequently asked Storage (SAN) basic interview question and answers. Check the Storage Area Networks (SAN) basic ...
-
Today i'm going to explain how to configure your VMware integration or backup policy in Veritas Netbackup in a simple and straight way...
-
NetBackup Tutorial: Steps to verify device configuration using "robtest" The process to absolutely verify that the drive pa...
-
#NetBackup interview Questions and Answers. I just described the answers as per my knowledge in a short term, if you need more details info...
-
Sample Error Log : [Critical] From: BSM@cellsrv01.in.com "backup_spec_01” Time: 8/16/2014 [61:12500] cannot connect to ...
-
QUESTION NO: 14 Which statements are true about Synthetic Full Backups? (Select two) A. The incremental backups must be written to t...