Monday, March 19, 2007

|_ A To Z Run Commands _|

An A-Z Index of the Windows NT/XP command line
ADDUSERS: Add or list users to/from a CSV file
ARP: Address Resolution Protocol
ASSOC: Change file extension associations
ASSOCIAT: One step file association
AT: Schedule a command to run at a later time
ATTRIB: Change file attributes

BROWSTAT: Get domain, browser and PDC info

CACLS: Change file permissions
CALL: Call one batch program from another
CD: Change Directory - move to a specific Folder
CHANGE: Change Terminal Server Session properties
CHKDSK: Check Disk - check and repair disk problems
CHKNTFS: Check the NTFS file system
CHOICE: Accept keyboard input to a batch file
CIPHER: Encrypt or Decrypt files/folders
CleanMgr: Automated cleanup of Temp files, recycle bin
CLEARMEM: Clear memory leaks
CLIP: Copy STDIN to the Windows clipboard.
CLS: Clear the screen
CLUSTER: Windows Clustering
CMD: Start a new CMD shell
COLOR: Change colours of the CMD window
COMP: Compare the contents of two files or sets of files
COMPACT: Compress files or folders on an NTFS partition
COMPRESS: Compress individual files on an NTFS partition
CON2PRT: Connect or disconnect a Printer
CONVERT: Convert a FAT drive to NTFS.
COPY: Copy one or more files to another location
CSVDE: Import or Export Active Directory data

DATE: Display or set the date
Dcomcnfg: DCOM Configuration Utility
DEFRAG: Defragment hard drive
DEL: Delete one or more files
DELPROF: Delete NT user profiles
DELTREE: Delete a folder and all subfolders
DevCon: Device Manager Command Line Utility
DIR: Display a list of files and folders
DIRUSE: Display disk usage
DISKCOMP: Compare the contents of two floppy disks
DISKCOPY: Copy the contents of one floppy disk to another
DNSSTAT: DNS Statistics
DOSKEY: Edit command line, recall commands, and create macros
DSADD: Add user (computer, group..) to active directoryDSQUERY List items in active directory
DSMOD: Modify user (computer, group..) in active directory

ECHO: Display message on screen
ENDLOCAL: End localisation of environment changes in a batch file
ERASE: Delete one or more files
EXIT: Quit the CMD shell
EXPAND: Uncompress files
EXTRACT: Uncompress CAB files

FC: Compare two files
FDISK: Disk Format and partition
FIND: Search for a text string in a file
FINDSTR: Search for strings in files
FOR: Conditionally perform a command several times
FORFILES: Batch process multiple files
FORMAT: Format a disk
FREEDISK: Check free disk space (in bytes)
FSUTIL: File and Volume utilities
FTP: File Transfer Protocol
FTYPE: Display or modify file types used in file extension associations

GLOBAL: Display membership of global groups
GOTO: Direct a batch program to jump to a labelled line

HELP: Online Help
HFNETCHK: Network Security Hotfix Checker

IF: Conditionally perform a command
IFMEMBER: Is the current user in an NT Workgroup
INSTSRV: Install an NT Service
IPCONFIG: Configure IP

KILL: Remove a program from memory

LABEL: Edit a disk label
LOCAL: Display membership of local groups
LOGEVENT: Write text to the NT event viewer.
LOGOFF: Log a user off
LOGTIME: Log the date and time in a file

MAPISEND: Send email from the command line
MEM: Display memory usage
MD: Create new folders
MODE: Configure a system device
MORE: Display output, one screen at a time
MOUNTVOL: Manage a volume mount point
MOVE: Move files from one folder to another
MOVEUSER: Move a user from one domain to another
MSG: Send a message
MSIEXEC: Microsoft Windows Installer
MSINFO: Windows NT diagnostics
MUNGE: Find and Replace text within file(s)
MV: Copy in-use files

NET: Manage network resources
NETDOM: Domain Manager
NETSH: Configure network protocols
NETSVC: Command-line Service Controller
NBTSTAT: Display networking statistics (NetBIOS over TCP/IP)
NETSTAT: Display networking statistics (TCP/IP)
NOW: Display the current Date and Time
NSLOOKUP: Name server lookup
NTBACKUP: Backup folders to tape
NTRIGHTSv Edit user account rights

PATH: Display or set a search path for executable files
PATHPING: Trace route plus network latency and packet loss
PAUSE: Suspend processing of a batch file and display a message
PERMS: Show permissions for a user
PERFMON: Performance Monitor
PING: Test a network connection
POPD: Restore the previous value of the current directory saved by PUSHD
PORTQRY: Display the status of ports and services
PRINT: Print a text file
PRNCNFG: Display, configure or rename a printer
PRNMNGR: Add, delete, list printers set the default printer
PROMPT: Change the command prompt
PUSHD: Save and then change the current directory

QGREP: Search file(s) for lines that match a given pattern.

RASDIAL: Manage RAS connections
RASPHONE: Manage RAS connections
RECOVER: Recover a damaged file from a defective disk.
REG: Read, Set or Delete registry keys and values
REGEDIT: Import or export registry settings
REGSVR32: Register or unregister a DLL
REGINI: Change Registry Permissions
REM: Record comments (remarks) in a batch file
REN: Rename a file or files.
REPLACE: Replace or update one file with another
RD: Delete folder(s)
RDISK: Create a Recovery Disk
RMTSHARE: Share a folder or a printer
ROBOCOPY: Robust File and Folder Copy
ROUTE: Manipulate network routing tables
RUNAS: Execute a program under a different user account
RUNDLL32: Run a DLL command (add/remove print connections)

SC: Service Control
SCHTASKS: Create or Edit Scheduled Tasks
SCLIST: Display NT Services
ScriptIt: Control GUI applications
SET: Display, set, or remove environment variables
SETLOCAL: Begin localisation of environment changes in a batch file
SETX: Set environment variables permanently
SHARE: List or edit a file share or print share
SHIFT: Shift the position of replaceable parameters in a batch file
SHORTCUT: Create a windows shortcut (.LNK file)
SHOWGRPS: List the Workgroups a user is in
SHOWMBRS: List the members of a Workgroup
SHUTDOWN: Shutdown the computer
SLEEP: Wait for x seconds
SOON: Schedule a command to run in the near future
SORT: Sort input
START: Start a separate window to run a specified program or command
SU: Switch User
SUBINACL: Edit file and folder Permissions, Ownership and Domain
SUBST: Associate a path with a drive letter

TASKLIST: List running applications and services
TIME: Display or set the system time
TIMEOUT: Delay processing of a batch file
TITLE: Set the window title for a CMD.EXE session
TOUCH: Change file timestamps
TRACERT: Trace route to a remote host
TREE: Graphical display of folder structure
TYPE: Display the contents of a text file

USRSTAT: List domain usernames and last login

VER: Display version information
VERIFY: Verify that files have been saved
VOL: Display a disk label

WHERE: Locate and display files in a directory tree
WHOAMI: Output the current UserName and domain
WINMSD: Windows system diagnostics
WINMSDP: Windows system diagnostics IIWMIC WMI Commands

XCACLS: Change file permissions
XCOPY: Copy files and folders

Fake Referrals

Benefits

Using Fake Referrals you can:
Refer to many sites without placing links to them on your site.
Find and add sites to refer to from the Internet
Schedule referring with built-in scheduler.
Add many sites to refer to at once.
Add many sites to refer from at once.
Add many sites to refer from at once.
Let everybody get known about you.

More:
CODEhttp://nezabudka.oksima.biz/referrals.php

DL:
CODEhttp://rapidshare.de/files/16503516/FakeReferralsInstaller.exe.html

Orkut Script Collection!

Orkut Script Collection!
1. Orkut Scrapping in colours and special characters!!

>> http://cyberneticz.blogspot.com/2006/08/orkut-scrapping.html

2. Get links to Album and Scrapbook beside every profile!!

>> http://cyberneticz.blogspot.com/2006/08/gr...-for-orkut.html

3. Orkut Scrapflooder Script!!

>> http://cyberneticz.blogspot.com/2006/08/or...ap-flooder.html

4. Orkut Scrapflooder Greasemonkey Script!!

>> http://cyberneticz.blogspot.com/2006/08/or...easemonkey.html

5. Orkut Scrapdeleter Greasemonkey Script!! (Works with new codes)

>> http://cyberneticz.blogspot.com/2006/08/or...easemonkey.html

6. Some donuts for you (Refreshes automatically when donut error comes)!!

>> http://cyberneticz.blogspot.com/2006/08/so...easemonkey.html

7. Orkut Friend Scrapper (Final Version is ready) !!

>> http://cyberneticz.blogspot.com/2006/08/fr...key-script.html

To run these scripts you need either of these:(Except #1 which runs on IE or Firefox, but NOT on Opera)

>> Greasemonkey(http://greasemonkey.mozdev.org) with Firefox

OR

>> Opera (Refer this for using UserJS: http://userjs.org/scripts/browser/enhancem...aa-gm-functions )

OR

>> Internet Explorer with Turnabout (http://www.softpedia.com/get/Tweak/Browser-Tweak/Reify-Turnabout.shtml)

How To Fix A Scratched Cd?

Dont throw out that scratched disc yet

Try fixing it with a small dab of...........CAR WAX!!!!

That's right and here's how to do it :

1. Spread a cloth on a flat surface and place the CD on it.
2. Then, hold the disc with one hand, use the other to wipe the polish into the affected area with a soft cloth.
3. Wait for it to dry and buff using short, brisk strokes along the scratch, not across it.
4. A cloth sold to wipe spectacles or camera lenses will work super m8's.
5. When you can no longersee the scratch,, wash the disc with water and let it dry before playing.

Chatting With Command Prompt, Doesnt Need Any S/W Options

Yo antoher tutorial for sending message through command prompt without downloading any kind of tool which do the same work u can use ur own command prompt..this is how it works..
if you want a private chat with a friend or client on you Network, you don't need to download any fancy program!
All you need is your friends IP address and Command Prompt.



Firstly, open Notepad and enter:

@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A

Now save this as "Messenger.bat". Open the .bat file and in Command Prompt you should see:

MESSENGER
User:

After "User" type the IP address of the computer you want to contact.
After this, you should see this:

Message:

Now type in the message you wish to send.
Before you press "Enter" it should look like this:

MESSENGER
User: ***.***.***.***
Message: Hi

Now all you need to do is press "Enter", and start chatting

How To Use Your Ipod As A Drive

1. Connect your iPod to your computer.

2. Open iTunes.

3. Click Edit and select Preferences.

4. Select the iPod tab.

5. Select the Music tab.

6. Check the Enable disk us checkbox.

7. Click OK.

Your iPod should now appear as a drive under My Computer. You can now copy files onto it like you would any other drive. When you are finished copying the files, you must eject the iPod before you disconnect it. To do this:

1. Select the iPod from the Source pane in iTunes.

2. Click the Eject iPod button in the lower right corner.

3. Wait for the confirmation message to unplug your iPod from the computer.

Create Your Own Folder Lock....

Create Own Folder Lock Softwar
Step 1 :Compile this code in C Language and generate EXE file of it....
#include
#include
void main()
{
FILE *f;
int n,i;
char fldr[20];
printf(">>>>>>>>>>>>>>>>>>>>>FOLDER LOCK<<<<<<<<<<<<<<<<<<<\n Coded by deepak garg");
printf("\nWhat do you want to do??");
printf("\n1).Lock Folder\n2).Unlock Folder\n");
scanf("%d",&n);
switch(n)
{
case 1: {f=fopen("conv.bat","w");
printf("\nEnter Folder Name : ");
scanf("%s",fldr);
fprintf(f,"rename %s %s.{21EC2020-3AEA-1069-A2DD-08002B30309D}\ndel conv.bat",fldr,fldr);
fclose(f);}break;
case 2: {f=fopen("conv.bat","w");
printf("\nEnter Folder Name : ");
scanf("%s",fldr);
fprintf(f,"rename %s.{21EC2020-3AEA-1069-A2DD-08002B30309D} %s\ndel conv.bat",fldr,fldr);
fclose(f);}break;
}
}


Step 2: After Getting exe file go to parent folder in which a folder to be locked is placed.. and run this programme

Step 3: it will create One file name conv.bat run this file and Wowvieeee... your folder is locked...

CLSID folders are special folders like My Computer, Control Panel, Recycle Bin etc.... here are few CLSID values i know of....

{00021400-0000-0000-C000-0000000000046}
{21EC2020-3AEA-1069-A2DD-08002B30309D}
{BD84B380-8CA2-1069-AB1D-0800948534}
{20D04FE0-3AEA-1069-A2D8-08002B30309D}
{645FF040-5081-101B-9F08-00AA002F954E}

respectively for....

Desktop
Control Panel
Fonts
My Computer
Recycle Bin

.......................................

what the program basically does is, it will link the folder to the respective CLSID folder.... to make any folder to a clsid folder u renmae it to.....
Folder Name.{CLSID-Value}
DO NOT FORGET THE '.' AFTER FOLDER NAME
to revert it back just rename it back to any other name
[size=5][b]you can also do it in explorer but you cant rename the locked folder to normal in windows
but can do in dos

Google Music Search

no more fillin long code in search textline

someone remembered to put it on a site.
also book search and google proxy.

http://g2p.org/

How To Copy & Paste Text In Mobile

Press and hold the pencil key and select your text using the scroll key.

Left function key will change to 'Copy'. Press it to copy the selected text to clipboard.

You can paste the clipboard contents the same way:

press and hold the pencil key and press 'Paste'. Or, press pencil key once and select 'Paste'

Google Copies Your Hard Drive

Google Copies Your Hard Drive - Government Smiles in Anticipation

Consumers Should Not Use New Google Desktop

San Francisco - Google today announced a new "feature" of its Google Desktop software that greatly increases the risk to consumer privacy. If a consumer chooses to use it, the new "Search Across Computers" feature will store copies of the user's Word documents, PDFs, spreadsheets and other text-based documents on Google's own servers, to enable searching from any one of the user's computers. EFF urges consumers not to use this feature, because it will make their personal data more vulnerable to subpoenas from the government and possibly private litigants, while providing a convenient one-stop-shop for hackers who've obtained a user's Google password.

"Coming on the heels of serious consumer concern about government snooping into Google's search logs, it's shocking that Google expects its users to now trust it with the contents of their personal computers," said EFF Staff Attorney Kevin Bankston. "If you use the Search Across Computers feature and don't configure Google Desktop very carefully—and most people won't—Google will have copies of your tax returns, love letters, business records, financial and medical files, and whatever other text-based documents the Desktop software can index. The government could then demand these personal files with only a subpoena rather than the search warrant it would need to seize the same things from your home or business, and in many cases you wouldn't even be notified in time to challenge it. Other litigants—your spouse, your business partners or rivals, whoever—could also try to cut out the middleman (you) and subpoena Google for your files."

The privacy problem arises because the Electronic Communication Privacy Act of 1986, or ECPA, gives only limited privacy protection to emails and other files that are stored with online service providers—much less privacy than the legal protections for the same information when it's on your computer at home. And even that lower level of legal protection could disappear if Google uses your data for marketing purposes. Google says it is not yet scanning the files it copies from your hard drive in order to serve targeted advertising, but it hasn't ruled out the possibility, and Google's current privacy policy appears to allow it.

"This Google product highlights a key privacy problem in the digital age," said Cindy Cohn, EFF's Legal Director. "Many Internet innovations involve storing personal files on a service provider's computer, but under outdated laws, consumers who want to use these new technologies have to surrender their privacy rights. If Google wants consumers to trust it to store copies of personal computer files, emails, search histories and chat logs, and still 'not be evil,' it should stand with EFF and demand that Congress update the privacy laws to better reflect life in the wired world."

Check For More Detailz
http://news.com.com/FAQ+When+Google+is+not+your+friend/2100-1025_3-6034666.html?tag=nl

How Viruses Work

There are tens of thousands of viruses out there, and new ones are discovered every day. It is difficult to come up with a generic explanation of how viruses work, since they all have variations in the way they infect or the way they spread. So instead, we’ve taken some broad categories that are commonly used to describe various types of virus.

Basics Types of Viruses (How They Work)
File Viruses (Parasitic Viruses)
File viruses are pieces of code that attach themselves to executable files, driver files or compressed files, and are activated when the host program is run. After activation, the virus may spread itself by attaching itself to other programs in the system, and also carry out the malevolent activity it was programmed for. Most file viruses spread by loading themselves in system memory and looking for any other programs located on the drive. If it finds one, it modifies the program’s code so that it contains and activates the virus the next time it’s run. It keeps doing this over and over until it spreads across the system, and possibly to other systems that the infected program may be shared with.
Besides spreading themselves, these viruses also carry some type of destructive constituent that can be activated immediately or by a particular ‘trigger’. The trigger could be a specific date, or the number of times the virus has been replicated, or anything equally trivial. Some examples of file viruses are Randex, Meve and MrKlunky.
Boot Sector Viruses
A boot sector virus affects the boot sector of a hard disk, which is a very crucial part. The boot sector is where all information about the drive is stored, along with a program that makes it possible for the operating system to boot up. By inserting its code into the boot sector, a virus guarantees that it loads into memory during every boot sequence. A boot virus does not affect files; instead, it affects the disks that contain them. Perhaps this is the reason for their downfall. During the days when programs were carried around on floppies, the boot sector viruses used to spread like wildfire. However, with the CD-ROM revolution, it became impossible to infect pre-written data on a CD, which eventually stopped such viruses from spreading. Though boot viruses still exist, they are rare compared to new-age malicious software. Another reason why they’re not so prevalent is that operating systems today protect the boot sector, which makes it difficult for them to thrive. Examples of boot viruses are Polyboot.B and AntiEXE.




Multipartite Viruses
Multipartite viruses are a combination of boot sector viruses and file viruses. These viruses come in through infected media and reside in memory. They then move on to the boot sector of the hard drive. From there, the virus infects executable files on the hard drive and spreads across the system.
There aren’t too many multipartite viruses in existence today, but in their heyday, they accounted for some major problems due to their capacity to combine different infection techniques. A significantly famous multipartite virus is Ywinz.
Macro Viruses
Macro viruses infect files that are created using certain applications or programs that contain macros. These include Mic*ft Office documents such as Word documents, Excel spreadsheets, PowerPoint presentations, Access databases, and other similar application files such as Corel Draw, AmiPro, etc. Since macro viruses are written in the language of the application, and not in that of the operating system, they are known to be platform-independent—they can spread between Windows, Mac, and any other system, so long as they’re running the required application. With the ever-increasing capabilities of macro languages in applications, and the possibility of infections spreading over net-works, these viruses are major threats.
The first macro virus was written for Mic*ft Word and was discovered back in August 1995. Today, there are thousands of macro viruses in existence—some examples are Relax, Melissa.A and Bablas.
Network Viruses
This kind of virus is proficient in quickly spreading across a Local Area Network (LAN) or even over the Internet. Usually, it propagates through shared resources, such as shared drives and folders. Once it infects a new system, it searches for potential targets by searching the network for other vulnerable systems. Once a new vulnerable system is found, the network virus infects the other system, and thus spreads over the network. Some of the most notorious network viruses are Nimda and SQLSlammer.
E-mail Viruses
An e-mail virus could be a form of a macro virus that spreads itself to all the contacts located in the host’s email address book. If any of the e-mail recipients open the attachment of the infected mail, It spreads to the new host’s address book contacts, and then proceeds to send itself to all those contacts as well. These days, e-mail viruses can infect hosts even if the infected e-mail is previewed in a mail client. One of the most common and destructive e-mail viruses is the ILOVEYOU virus.
There are many ways in which a virus can infect or stay dormant on your PC. However, whether active or dormant, it’s dangerous to let one loose on your system, and should be dealt with immediately.



Other Malicious Software
Earlier, the only way a computer was at risk was when you insert-ed an infected floppy. With the new age of technology, every computer is interconnected to the rest of the world at some point or the other, so it’s difficult to pinpoint the source and/or time of the infection. As if that weren’t bad enough, new-age computing has also brought about a new breed of malicious software. Today, the term ‘virus’ has become a generic term used for all the different ways that your computer can be attacked by malicious software. Besides the type of viruses we mentioned here’s a look at some of the newer problems we face today.
Trojan Horses
The biggest difference between a Trojan horse—or Trojan—and a virus is that Trojans don’t spread themselves. Trojan horses disguise themselves as useful software available for down-load on the Internet, and naïve users download and run them only to realise their mistake later.
A Trojan horse is usually divided into two parts—a server and a client. It’s the client that is cunningly disguised as important soft-ware and placed in peer-to-peer file sharing networks, or unofficial download sites. Once the client runs on your system, the attacker—the person running the server—has a high level of control over your system, which can lead to devastating effects depending on the attacker’s intentions. Trojan horses have evolved to a tremendous level of sophistication, which makes each one significantly different from the other.
We have categorized them roughly into the following:
Remote Access Trojans
These are the most commonly available Trojans. These give an attacker complete control over the victim’s computers. The attacker can go through the files and access any personal information about the user that may be stored in the files, such as credit card numbers, passwords, and important financial documents.
Password-sending Trojans
The purpose of such Trojans is to copy all cached passwords and look for other passwords as you enter them, and send them to specific mail address, without the user’s knowledge. Passwords for restricted Web sites, messaging services, FTP services and e-mail services come under direct threat with this kind of Trojan.
Keyloggers
These log victims’ keystrokes and then send the Logs to the attacker. The attacker then searches for passwords or other sensitive data in the log files. Most of them come with two functions, such as online and offline recording. Of course, they can be configured to send the log file to a specific-mail address on a daily basis


Destructive
The only function of these Trojans is to destroy and delete files. They can
automatically delete all the core system files on your machine. The Trojan could be
Controlled by the attacker or could be programmed to strike like logic bomb-starting on a specific day or at specific hour.
Denial of Service (DoS) Attack Trojans
The main idea behind this kind of Trojan is to generate a lot of Net traffic on the victim’s machine, to the extent that the Internet connection is too overloaded to let the user visit a Web site or download any-thing. Another variation of a DoS Trojan is the mail-bomb Trojan, whose main aim is to infect as many machines as possible and simultaneously attack specific e-mail addresses with random subjects and contents that cannot be filtered.
Proxy/Wingate Trojans
These types of Trojan turn the victim’s computer into a proxy/wingate server. That way, the infected computer is available to the whole world to be used for anonymous access to various risky Internet services. The attacker can register domains or access pornographic Web sites with stolen credit cards or do similar illegal activities without being traced.
FTP Trojans
These trojans are probably the most simple, and are outdated. The only thing they do is open port 21—the port for FTP transfers—and let everyone connect to your machine. Newer versions are password-protected, so only the attacker can connect to your computer.
Software Detection Killers
These trojans kill popular antivirus/firewall programs that protect your machine to give the attacker access to the victim’s machine. A trojan could have any one or a combination of the above mentioned functionalities.
Worms
Computer Worms are programs that reproduce and run independently, and travel across network connections. The main difference between viruses and worms is the method in which they reproduce and spread. A virus is dependent upon a host file or boot sector, and the transfer of files between machines to spread, while a worm can run completely independently and spread of its own accord through network connections. The security threat of worms is equivalent to that of a virus. Worms are capable of doing a whole range of damage such as destroying essential files in your system, slowing it down to a great extent, or even causing some essential programs to crash. Two famous examples of worms are the MS-Blaster and Sesser worms.



Spyware
Spyware is the new-age term for advertising-supported software (Adware). Advertising in shareware products is a way for shareware authors to make money, other than by selling it to the user. There are several large media companies that offer to place banner ads in their products in exchange for a portion of the revenue from banner sales. If the user finds the banners annoying, there is usually an option to get rid of them by paying the licensing fee.
Unfortunately, the advertising companies often also install additional tracking software on your system, which is continuously using your Internet connection to send statistical data back to the advertisers. While the privacy policies of the companies claim there will be no sensitive or identifying data collected from your system and that you shall remain anonymous, the fact remains that you have a server sitting on your PC that is sending information about you and your surfing habits to a remote location, using your bandwidth.
Spyware has been known to slow down computers with their semi-intensive usage of processing power, bringing up annoying pop-up windows at the most inappropriate times and changing your Internet browsing settings such as your home page or default search engine to their own services.
Even if many do not consider this illegal, it is still is a major security threat, and the fact that there’s no way to get rid of them makes them as much of a nuisance as viruses.
Logic Bombs
A logic bomb is a program which has deliberately been written or modified to produce results when certain conditions are met that are unexpected and unauthorized by legitimate users or owners of the software. Logic bombs may reside within standalone programs, or they may be part of worms or viruses. A variation of the logic bomb is the time bomb that ‘explodes’ at a certain time. An example of a time bomb is the infamous ‘Friday the 13th’ virus.

De-crypt Encrypted files on Windows XP

De-crypt Encrypted files on Windows XP

1. Login as Administrator

2. Go to Start/Run and type in cmd and click OK.

At the prompt type cipher /r:Eagent and press enter

This prompt will then display:

Please type in the password to protect your .PFX file:

Type in your Administrator password
Re-confirm your Administrator password

The prompt will then display

Your .CER file was created successfully.
Your .PFX file was created successfully.

The Eagent.cer and Eagent.pfx files will be saved in the current directory that is shown at the command prompt. Example: The command prompt displays C:\Documents and Settings\admin> the two files are saved in the admin folder. (For security concerns, you should house the two files in your Administrator folder or on a floppy disk).

3. Go to Start/Run and type in certmgr.msc and click OK. This will launch the Certificates Manager. Navigate to Personal and right click on the folder and select All Tasks/Import. The Certificate Import Wizard will appear. Click Next. Browse to the C:\Documents and Settings\admin folder. In the Open dialog box, change the Files of Type (at the bottom) to personal Information Exchange (*.pfx,*.P12). Select the file Eagent.pfx and click Open. Click Next. Type in your Administrator password (leave the two checkboxes blank) and click Next. Make sure the Radio button is active for the first option (Automatically select the certificate store based on the type of certifcate). Click Next. Click Finish. (You'll receive a message that the import was successful). To confirm the import, close Certificates Manager and re-open it. Expand the Personal folder and you will see a new subfolder labeled Certificates. Expand that folder and you will see the new entry in the right side column. Close Certificate Manager.

4. Go to Start/Run and type in secpol.msc and click OK. This will launch the Local Security Policy. Expand the Public Key Policies folder and then right click on the Encrypted File System subfolder and select Add Data Recovery Agent... The Wizard will then display. Click Next. Click the Browse Folders... button. Browse to the C:\Documents and Settings\admin folder. Select the Eagent.cer file and click Open. (The wizard will display the status User_Unknown. That's ok). Click Next. Click Finish. You will see a new entry in the right side column. Close the Local Security Policy.

You, the Administrator are now configured as the default Recovery Agent for All Encrypted files on the Local Machine.

To Recover Encrypted files:

Scenario #1

If you have completed the above steps BEFORE an existing user encrypted his/her files, you can log in to your Administrator account and navigate to the encrypted file(s). Double click on the file(s) to view the contents.

Scenario #2

If you have completed the above steps AFTER an existing user has already encrypted his/her files, you must login to the applicable User's User Account and then immediately logout. Next, login to your Administrator account and navigate to the encrypted file(s). Double click on the file(s) to view the contents.


*Warning

Do not Delete or Rename a User's account from which will want to Recover the Encrypted Files. You will not be able to de-crypt the files using the steps outlined above.

De-crypt Encrypted files on Windows XP

De-crypt Encrypted files on Windows XP

1. Login as Administrator

2. Go to Start/Run and type in cmd and click OK.

At the prompt type cipher /r:Eagent and press enter

This prompt will then display:

Please type in the password to protect your .PFX file:

Type in your Administrator password
Re-confirm your Administrator password

The prompt will then display

Your .CER file was created successfully.
Your .PFX file was created successfully.

The Eagent.cer and Eagent.pfx files will be saved in the current directory that is shown at the command prompt. Example: The command prompt displays C:\Documents and Settings\admin> the two files are saved in the admin folder. (For security concerns, you should house the two files in your Administrator folder or on a floppy disk).

3. Go to Start/Run and type in certmgr.msc and click OK. This will launch the Certificates Manager. Navigate to Personal and right click on the folder and select All Tasks/Import. The Certificate Import Wizard will appear. Click Next. Browse to the C:\Documents and Settings\admin folder. In the Open dialog box, change the Files of Type (at the bottom) to personal Information Exchange (*.pfx,*.P12). Select the file Eagent.pfx and click Open. Click Next. Type in your Administrator password (leave the two checkboxes blank) and click Next. Make sure the Radio button is active for the first option (Automatically select the certificate store based on the type of certifcate). Click Next. Click Finish. (You'll receive a message that the import was successful). To confirm the import, close Certificates Manager and re-open it. Expand the Personal folder and you will see a new subfolder labeled Certificates. Expand that folder and you will see the new entry in the right side column. Close Certificate Manager.

4. Go to Start/Run and type in secpol.msc and click OK. This will launch the Local Security Policy. Expand the Public Key Policies folder and then right click on the Encrypted File System subfolder and select Add Data Recovery Agent... The Wizard will then display. Click Next. Click the Browse Folders... button. Browse to the C:\Documents and Settings\admin folder. Select the Eagent.cer file and click Open. (The wizard will display the status User_Unknown. That's ok). Click Next. Click Finish. You will see a new entry in the right side column. Close the Local Security Policy.

You, the Administrator are now configured as the default Recovery Agent for All Encrypted files on the Local Machine.

To Recover Encrypted files:

Scenario #1

If you have completed the above steps BEFORE an existing user encrypted his/her files, you can log in to your Administrator account and navigate to the encrypted file(s). Double click on the file(s) to view the contents.

Scenario #2

If you have completed the above steps AFTER an existing user has already encrypted his/her files, you must login to the applicable User's User Account and then immediately logout. Next, login to your Administrator account and navigate to the encrypted file(s). Double click on the file(s) to view the contents.


*Warning

Do not Delete or Rename a User's account from which will want to Recover the Encrypted Files. You will not be able to de-crypt the files using the steps outlined above.

Infinite Loop Fix

nfinite Loop Fix

The best solution to most issues with looping is POWER SUPPLY. Due to the huge amount of resources that video cards, sound cards, larger cpu's, they suck your power supply to the point that application cant perform. In turn it causes lockup, reboot and boot to desk top.A lot of resellers are only slapping in a 300watt power supply in newer systems. That doesn't work, you need at least a 400watt or greater.Now for example: AMD 2100cpu, gf4 video card, cd burner, cd rom,netcard, modem, 2 or 3 hard drivers( raid especially ). You need at least 450watt POWER SUPPLY. Take my word on it.This is the biggest issue i have studied on the net . So many people have taken components back to the stores had them tested, to find out there is nothing wrong with them and go around shaking there heads in wonderment, without even considering POWER SUPPLY. So next time think about it, do the math ( HOW MUCH POWER IS MY SYSTEM USING )

Guide To Buying Hard Drives

Apart from being one of the most essential parts of your computer, hard drive storage is constantly updating, in terms of both capacity of disk space and in physical size. When it comes time to upgrade your disk storage, there are a number of factors for you to take into account. Once you've made basic decisions about size, connectivity, speed and data transfer rate, and whether you want an internal drive or external, you can search through www.deltapage.com or Myshopping.com.au to find the most suitable brand, and model, and compare the prices of different vendors.For anymore queries PM me on yahoo messenger ID hackers2005.3721

How A Hard Drive Works
Your hard drive has a number of magnetized platters connected to a spindle. The spindle spins the platters at a very fast speed while a series of read/write heads scan over them both looking for and writing information. This information is transferred via a cable system, or through a wireless connection to a hard disk controller, which in most systems is built into the motherboard, or in some systems installed as an add-in card. The information that comes from your hard drive through its controller is then made available to the components of your computer. The effectiveness of your hard drive (its performance) depends on how much of its capacity remains unused, how well organised the data is (known as fragmentation) and its data transfer rate, which in turn is dependent on its connection type and the drive's spin rate.

Internal Hard Drives
Most computers from, the most basic home models up to the most powerful servers, have an internally installed hard drive. Technology today ensures that they are all generally fast, reliable, and offer dependable storage ability. Most modern computers have installation slots and cabling to enable you to install additional hard drive. This allows you to increase your storage capacity without giving up your existing hard drive.

External Hard Drives
These drives are essentially the same drives as ones installed inside computers, but cased inside a protective, portable case. This is a good solution for people who work remotely and need to transport large amounts of data. If an external hard drive is your choice, make sure your computer is compatible with the interface that the hard drive uses. An add-in card, such as a FireWire card can help to increase your computer's capabilities. You can compare different brands of external hard drives simply at Myshopping.com.au and search on the connection type, or other specifications.

Laptop Hard Drives
There have been many advances in miniaturization of hardware components for laptop computing, and hard drive technology is not left out of this loop. Laptop hard drives function in exactly the same way as internal hard drives on other computers, only they are designed to provide maximum storage and efficiency in the smallest possible package. For added flexibility, some laptop computers come with removable hard drives that can be easily installed and removed. However, before you buy a hard drive for your portable computer, check that the hard drive's specifications will meet the standards of your computer, as many laptop hard drives are proprietary, and are not compatible with other brands and models.

Size
Your hard drive stores your operating system, its programs (games and applications), your working data, and your digital music and movies. Most new computer purchases have a minimum of 80 GB of hard disk space; many have considerably more. Hard drive space is one of those things, once you have it, you'll find ways to fill it soon enough. There is no real rule of thumb, but consider the cost per gigabyte of storage as a way to guide your purchase. If you work with large files, such as music, video and graphics, it pays to have a big storage space for your work. It may pay you to have two hard drives, one that houses all your programs and applications, and another for storing your work and projects.
You may want to compare the price of say a 160GB drive against two separate 80 GB drives. If one drive fails all is not lost. Today's hard drives however, are fairly robust pieces of equipment and providing they are not abuse, will serve you well for a long period of time.

Interface
One key distinguishing factor between hard drives is the way in which they connect to your computer. There are a number of basic types of connection schemes used with hard drives. Each connection type has a range of differences in performance.

IDE (INTEGRATED DRIVE ELECTRONICS)
This is by the most common connection methods. Because the hard drive controller is on the drive itself rather than on the motherboard, it helps to keep costs down. There different IDE standards available. Mostly, you will want to purchase the fastest possible standard that your computer can support. Most computers will support a standard that is faster than what the computer currently supports, so you can buy a faster drive, and update your computer at a later time. The different IDE standards, in order from most basic to fastest, are:
ATA (Basic). Supports up to two hard drives and features a 16-bit interface, handling transfer speeds up to 8.3 MB per second.
ATA-2 or EIDE (Enhanced IDE). Supports transfer speeds up to 13.3 MB per second.
ATA-3. A minor upgrade to ATA-2 and offers transfer speeds up to 16.6 MB per second.
Ultra-ATA (Ultra-DMA, ATA-33 or DMA-33). Dramatic speed improvements, with transfer rates up to 33 MB per second.
ATA-66. A version of ATA that doubles transfer rates up to 66 MB per second.
ATA-100. An upgrade to the ATA standard supporting transfer rates up to 100 MB per second.
ATA-133. Found mostly in AMD-based systems (not supported by Intel), with transfer rates up to 133 MB per second.

SCSI (SMALL COMPUTER SYSTEM INTERFACE)
This is the hard drive interface standard used by many high-end PCs, networks and servers, and Apple Macintosh computers, except for the earliest Macs and the newer iMacs. While some systems support SCSI controllers on their motherboards, most feature a SCSI controller add-in card. SCSI drives are usually faster and more reliable, and the SCSI interface supports the connection of many more drives than IDE. While SCSI drives come in many different standards, many of them are not compatible with one another. So it's important be know that your computer supports the drive you plan to install. The different SCSI connections are:
SCSI-1. A basic connection using a 25-pin connector, supporting transfer rates up to 4 MB per second.
SCSI-2. Uses a 50-pin connector and supports multiple devices with a transfer rate of 4MB per second.
Wide SCSI. These drives have a wider cable and a 68-pin connection that supports 16-bit data transfers.
Fast SCSI. Uses an 8-bit bus but transfers data at 10 MB Per second.
Fast Wide SCSI. Doubles both the bus (16-bit) and the data transfer rate (20 MB per second).
Ultra SCSI or Ultra Wide SCSI. Uses an 8-bit bus and transfers data at 20 MB per second.
SCSI-3. Features a 16-bit bus and transfers data at 40 MB per second.
Ultra2 SCSI. Uses an 8-bit bus and transfer data at a rate of 40 MB per second.
Wide Ultra2 SCSI. Uses a 16-bit bus and supports data transfer rates of 80 MB per second.

FIREWIRE (IEEE 1394)
The FireWire standard is becoming popular in portable hard drives because it can be connected and removed without having to reboot the computer. It supports data transfer rates of 50 MB per second, which means it is ideal for video, audio and multimedia applications. FireWire requires a dedicated add-in card and the hard drives in use require an external power source, but the interface can support up to 63 devices simultaneously.

USB 1.1 (UNIVERSAL SERIAL BUS)
Pretty much all computers today include USB ports on their motherboards. (On older model, you can install an add-in card.) USB controllers can be used to connect external hard drives, and can support as many as 127 devices simultaneously either through USB port hubs or linked in a daisy chain fashion. USB controllers do delivery power to devices connected to them, but many hard drives still use an external power source. USB is limited by its data transfer speed, the maximum rate being about at 1.5 MB per second.

USB 2.0 (HI-SPEED USB)
A more recently introduced and far better connection standard that offers backward compatibility and data transfer rates of up to 60 MB per second. USB 1.1 system can use a USB 2.0 device; it will need a USB 2.0 controller card to achieve the higher transfer rates.

FIBRE CHANNEL
Fibre Cabling is mainly used for high-bandwidth network servers and workstations, providing very fast data transfer rates (up to 106MB per second), and connection at long cabled distances, although it is expensive and you need to install a special interface card.

Spin rate
Data transfer rate is crucial to how well your computer performs for you. Apart from the connection types above, the performance of your hard drive depends on its spin rate, measured in RPM. Higher RPM generally means faster data transfer rate. The lowest spin speed that is acceptable in computing today is 5400 RPM. The common standard at present is 7200 RPM. But higher speeds are available in SCSI drives, and it is one area of computer system technology that is constantly being developed.

A larger capacity hard drive will not necessarily make your system function any faster unless you are low on available disk space with your existing drive. But a drive with Ultra ATA/100 or ATA/133 and a 7200 RPM spin rate will pretty much guarantee an improved hard drive performance.
Other considerations

CACHE
Cache (pronounces 'cash') is additional temporary memory that acts as a buffer between the system and the drive. Frequently accessed data is stored in the cache for quick access. Cache sizes vary from 512 KB up to 16 MB on some SCSI drives. The larger cache you have on your drive, the faster your drive will transfer data. If you are working with large files, such as video, images and audio files, it pays to have the largest cache you can get (8MB or more).

SEEK TIME
The data on your disk is stored in tracks and sectors and when you instruct your hard drive controller to retrieve some data, it goes looking. The seek time is a measure of how long it takes the hard drive to find a specific track on a disk. Seek times can vary slightly from disk to disk and a drive with a faster seek time will always perform better.

INTERNAL AND EXTERNAL TRANSFER RATES
These two rates tell how fast a drive actually reads the data and passes it along to the system. Internal Transfer Rate refers to the time it takes for a drives heads to read data from the platter and pass it to the drive's cache. The External Transfer Rate (sometimes called the Transfer Rate or the Burst Transfer Rate) is a measure of the time it takes to send the data from the cache all the way to the computer's memory. Naturally faster transfer rates provide better performance.

S.M.A.R.T. (Self-Monitoring Analysis and Reporting Technology)
This is a nice built-in feature in some hard drives that can help alert you to a potential hardware problem. Your computer's BIOS must support this in order for the SMART function it to work, however the drive itself will still work in a system without it.
Buying and installing a hard drive has some technical aspects that you need to take into account. Use Myshopping.com.au to compare different hard drive makes and specifications to find the drive that will work best for your needs and computer. You can compare prices and service offers from different vendors.