Saturday, April 30, 2011

vocal removal from songs

u can also have the full guide to vocal removal . here

see pics at my page in the vocal removal collection as i couldnt link them here.
Well guys,

I remember posting a topic myself, asking about vocal removal.
So here is an in depth guide by me to vocal removal and adding effects, to make it fit for karaoke.

IT IS NOT POSSIBLE TO COMPLETELY REMOVE THE VOCALS. THEY WILL BE MINIMISED TO A GREAT EXTENT. AND KEEP IN MIND THAT THE MUSIC WILL ALSO CHANGE TO SOME EXTENT. HENCE EQUILIZATION IS APPLIED.

A)-test bed: p3 933mghz, 256mbs ram, and onboard sound.
B)-software used: 1)-vocal remover (a directx plug-in by analogx), (VR)vremover

2)-cool edit pro (for editing), (CEP)
3)-mp3 gain (for volume leveling), (MP3G)
4)-Karaoke Island's easy pc recording studio (for karaoke recording) (EPRS)

C)-song used: Tanha dil by Shaan

I have divided the whole process in 4 phases, namely:

1:-vocal removal
2:-equilization
3:-de-amplification & volume leveling
4:-karaoke recording


ALWAYS LISTEN TO PREVIEW BEFORE APPLYING EFFECTS WHENEVER POSSIBLE.

PHASE1:- VOCAL REMOVAL

First open the original song, of which a karaoke is to be made, in CEP.

After installing VR, refresh the effects list in CEP. U will see directx->vocal remover
Open it and click ok, only after listening to preview.

select "entire wave" from edit-> and apply vocal removal
Then hear the output
here

PHASE 2:-EQUILIZATION
Then equalization is applied as per need and song.

Remember, to use one of the presets given, that sounds good and make changes as per original song, to sound better.

Then hear the output here


PHASE 3:-DE-AMPLIFICATION & VOLUME LEVELLING

Reverse Engineering Curse of Monkey Island v1

Lesson 1 - Patching CoMI
Ok, let's get straight down to business; open up CURSE.exe and then click the 'Play...' button and you'll be presented with a message box telling you that the cd cannot be found. Before we open wwdisp.exe in our debugger (Olly), let's just think for a second, what are our main ways of attack on this game? Well it's a game, a game that uses a cd check, now we could either search for the string (the message that was displayed when you tried playing the game without a cd), or instead we could set a breakpoint on 'GetDriveTypeA' (which is an api call that begins a procedure to check if the cd is inserted).
Right, time to debug, launch OllyDbg (this is our debugger), before we do anything else, to make things easier on ourselves, right click in Olly, and select 'Appearance->Highlighting->Jumps'n'calls'. Now open up CURSE.exe in Ollydbg, right click and select 'Search for->Name (label) in current module', once there, to make things easier (my preference anyways) right click and choose 'Sort by->Name'. Now press 'G' to go to the G section, and left click 'GetDriveTypeA', right click it and select 'Set breakpoint on every reference', close that window to return to the main debugging window. Hit F9 (to run the program), now on your taskbar the CoMI (Curse of Monkey Island) loader should have loaded, click that up and hit the 'Play...' button, and voila! We land at our breakpoint (GetDriveTypeA), and it should look like this:

00401B74 . FF15 FCE74200 CALL DWORD PTR DS:[<&KERNEL32.GetDriveTy>; \GetDriveTypeA

Keep pressing F8 (to step through the code) until you reach here:

00401C10 75 40 JNZ SHORT CURSE.00401C52

The JNZ is a conditional jump that stands for Jump if Not Equal To, now if you look below all the addresses, but above the Hex dump, you will see that it says 'Jump is NOT taken', and if you look a few lines down, here:

00401C16 . 68 84664200 PUSH CURSE.00426684 ; ASCII "/LNCH026/Unable to find The Curse of Monkey Island CD. Please insert either The Curse of Monkey Island CD into the CD-ROM drive."

which is our 'bad-guy-code', so what we do is we change the JNZ so that it will always jump to the 'good-guy-code' no matter what; to do this we change JNZ to EB, EB represents a straight JUMP (non-conditional), to do this right click where you are and select, 'Binary->Edit', and change the 75 40 to EB 40 and click the 'OK' button. Once again keep pressing F8 until you land here:

00401C86 74 17 JE SHORT CURSE.00401C9F

We see that this jump is also not taken, which isn't very good for us, because if you look a few lines down you will see this:

00401C8C . 68 E0654200 PUSH CURSE.004265E0 ; ASCII "/LNCH024/Couldn't change the current directory to the root of the CD which is necessary to be able to play The Curse of Monkey Island. Will try to run anyway..."

and we want to jump away from this; so once again it's time to change some bytes, change the 74 17 to a EB 17. Well done cracker! You've successfully cracked this game, to make the changes permanent, right click and choose, 'Copy to executable->All modifitications->Copy all' then right click again and select, 'Save file' and save it as CURSE2. Now go back to the main Olly window, and hit F9, voila! It works. Now close the game by pressing 'Alt+F2' and load CURSE2 outside of Olly!! Argh it doesn't work!!!!

IRC: An alternative to P2P

IRC: AN ALTERNATIVE TO P2P ]



INTRODUCTION

Anyone who has been using The Internet must be aware of the term p2p. Well, for the uninitiated ones, p2p means peer2peer

Kazza, e-donkey, mldonkey, etc are the famous ones. But, have you tried to download software from them..? Yeah sure you'll get your stuff, but, sometimes with an added bonus, which could be some spyware or even a virus. Anyway the point I am making is: p2p sucks!!!

Anyways, you want some better stuff, eh? OK... There are two better things to go with: FTP servers or bots on mIRC servers. I'll be detailing on the mIRC aspect of the deal.



BACKGROUND INFO


So, what is IRC anyway? [basic question; taken from IRChelp.org]

Quote:
IRC (Internet Relay Chat) provides a way of communicating in real time with people from all over the world. It consists of various separate networks (or "nets") of IRC servers, machines that allow users to connect to IRC. The largest nets are EFnet (the original IRC net, often having more than 32,000 people at once), Undernet, IRCnet, DALnet, and NewNet.
Generally, the user (such as you) runs a program (called a "client") to connect to a server on one of the IRC nets. The server relays information to and from other servers on the same net.


Recommended clients:

Once connected to an IRC server on an IRC network, you will usually join one or more "channels" and converse with others there. OnEFnet, there often are more than 12,000 channels, each devoted to a different topic. Conversations may be public (where everyone in a channel can see what you type) or private (messages between only two people, who may or may not be on the same channel).


Now you do have a little background on what IRC is..


I'll be using a proggie called mIRC for windows platform as our client.

mIRC is a little program developed by Khaled Mardam-Bey, its a shareware (but, is not "crippled" in anyway) and the latest version is 6.14

The purpose of mIRC is to connect you to IRC servers (IRC = Internet Relay Chat). It was basically designed for chatting and occasional file send.

Basically one person can send a file directly to the other..this is called DCC (Direct Client Connection)

Repack and custom Longhorn setup User guide

1) get Longhorn For PDC DVD disk1, select install Longhorn x86 (clean install)

2)after Windows setup section 1 and section 2 had finished , boot to another OS,(eg:XP/2003).
note: Windows longhorn setup :

Quote:
section 1:Windows setup will copy all setup files needed(winpe files and Longhorn system img -----install.wim)

section 2: Windows PE will copy all Longhorn system files to target drive.

you need stop here before?setup section 3 started.

section 3:Windows Longhorn use sysprep setupmode to detect hadrware ,install drivers and signhash CD-KEY........

section 4:boot to normal mode
3)make a work dir:
Quote:
\LH4051
\LH4051\i386
\LH4051\i386\system32
\LH4051\temp
4)copy Longhorn cleaninstall drive \windows\i386 foldir to your work dir \LH4051\temp
copy Longhorn cleaninstall drive \windows\Microsoft.NET\Framework folder to your work dir \LH4051\temp

5)remove files from \LH4051\temp\i386 to \LH4051\i386 (they can't be compressed):
Quote:
\LH4051\temp\i386\lang
asms01.cab(you can use LH4051 x64 version files)

autochk.exe
autofmt.exe
bootfix.bin
cabinet.dll
clfs.sys
dbgeng.dll
dbghelp.dll
docs.cab
dosnet.inf
Quote:
dotnetpe.cab(you can find it in LH4051 DVD \source)
driver.cab
drvindex.inf
drvmain.sdb
eula.txt
expand.exe
fp50ext.cab
gpscript.exe
helpcab.cab

Performance Tweaks and Tips for XP

Please read this title very carefully because this guide is ONLY intended for Performance related tweaks. There's millions of other "tweaks" that other guides use but have nothing to do with performance. In this guide I'm ONLY including what actually has some kind of affect on performance. I am trying to keep this guide dedicated to tweaks that directly affect your performanceDisclaimer: There's a LOT of potential damage that can be done with the data within this article. You will have to understand the risks. You could potentially cause your system to quit booting and many other things. You will want to make a backup of anything important just in case. Please move on if you understand that and are willing to risk things.

What are the tools of the trade?

Notepad - With this baby you can get out of having to spend much time in regedit What you will want to do is create a file call tweaks.reg on your desktop. You need to add REGEDIT4 on the first line. After that files has been created right click on it and select edit. Next paste what I have in italics into that file. You will have to read what I have said about each tweak and you'll have to change some of them according to your system. Some people have reported they had to start with a filename of tweaks.txt paste the contents in and then rename it to .reg when they're done.

Regedit - Knowing how to use it to edit your registry is a MUST for this guide. It is the only tool that we're using here.

To run it you will have to click on the start menu and select run. From there you type regedit. From there you can browse around and find all kinds of things to change/edit. If you're new to this make sure you look but NOT touch. Make sure that you make a backup before you touch anything. To do this you click on File and then export. Save the registry file someplace safe and if your screw something up you will have to return to regedit and either fix your changes or import the old file. I suggest you reboot after every line that you change since you'll have to restart windows in order for the changes to take affect. You don't want to do too many edits at a time. This will slowly help you safely tweak things out.

Basically browsing the registry is setup just like browsing folders in windows explorer. When I say something like "the key you need to edit can be found here HKEY_LOCAL_MACHINE/Software/Microsoft" you will click on the HKEY_LOCAL_MACHINE folder and then look for the Softwarefolder and then the Microsoft folder and the key you either have to add or edit will be in there. I will tell you very specific keys to add or edit. You will see the keys within that folder in the right side box.

Overview of E-Commerce Technology

What Is Electronic Commerce?

Overview
Electronic commerce is doing business online. It is about using the power of digital information to understand the needs and preferences of each customer and each partner to customize products and services for them, and then to deliver the products and services as quickly as possible. Personalized, automated services offer businesses the potential to increase revenues, lower costs, and establish and strengthen customer and partner relationships. To achieve these benefits, many companies today engage in electronic commerce for direct marketing, selling, and customer service; online banking and billing; secure distribution of information; value chain trading; and corporate purchasing.

Although the benefits of electronic commerce systems are enticing, developing, deploying, and managing these systems is not always easy. In addition to adopting new technology, many companies will need to reengineer their business processes to maximize the benefits of electronic commerce.

An electronic commerce strategy should help deliver a technology platform, a portal for online services, and a professional expertise that companies can leverage to adopt new ways of doing business. Platforms are the foundation of any computer system. An e-commerce platform should be the foundation of technologies and products that enable and support electronic commerce. With it, businesses can develop low-cost, high-value commerce systems that are easy to grow as business grows. An e-commerce platform's breadth should also be unmatched, ranging from operating systems to application servers, to an application infrastructure and development tools, and to a development system.

Portals are the crossroads of the Internet, where consumers gather and where businesses can connect with them. Companies normally provide customers with a wide range of choices for professional implementation services and tightly integrated software for commerce solutions. Independent software vendors (ISVs) have created specialized commerce software components that extend the platform.

This guide details introductory strategies and priorities for electronic commerce, which sets the stage for the rest of the book. It also describes how the platform, portal, and partners are critical to solving business problems in the four most common areas of electronic commerce: direct marketing, selling, and service; value chain integration; corporate purchasing; and financial

Burning Copy Protected Cd's

] Introduction /Disclamier

2] Type of protections

3] Hardware Req.

4] Software Req.

5] Step bY Step guide


--------------------------------------------------------------

1] Introduction / Disclamier

This is my first origional tutorial written by me (technical info taken form the web)

hope u guys like it ..


More and more often these days Software companies and Game developers alike are coming up with new ways to stop people creating illegal copies of copyrighted software and games. A more obvious and common way for companies to do this is to use Commercially Developed CDR Protections which when used on the game or software makes it nearly impossible to copy the game. It is illegal to copy or burn a copyrighted game to sell or give to others, which most of you would know, but it is not illegal to make a personal back-up copy for yourself of the game provided you are the original owner of the game. The advantages of making a back-up copy of a game is that once you have the back-up copy you don't need the original so it can be kept safe in the cover and if the back up copy gets scratched you will still have the original game.


--------------------------------------------------------------

2] Type of protections

The following are the types of protections used to protect a cd from being replicated

CD Checks

SafeDisc

SecuRom

Illegal TOC (Table Of Contents)

OverSized/OverBurn CD's

LaserLock

ProtectCD

DiscGuard

CD-Cops

FADE

StarForce

SafeDisc 2

SecuRom

SecuRom Trigger Functions

In this tutorial we will be backing up a copy of Age Of Empires II (rise of nations)
which is protected by Safe Disc


--------------------------------------------------------------

The Evolution toward the Mobile Internet

Introduction
Simply stated, the mobile Internet can be thought of as the migration of standard Internet applications and services to a mobile environment. The introduction of mobility, however, raises a number of new considerations: What wireless technology is most appropriate for the provision of Internet services? Is this technology equally appropriate for applications with dissimilar requirements, such as e-mail and video broadcasting? How do we provide ubiquitous Internet services while users move across different locations, where the same wireless service may not be available? Will it be more appropriate to consider several wireless technologies, such as cellular data networks, wireless local area networks (WLANs), wireless personal area networks (WPANs), and so forth? If so, then how do we combine them into a seamless wireless service? How do we optimize the utilization of wireless resources to accommodate as many mobile Internet users as possible? How do we handle the security issues raised by the wireless transmission and possibly by the use of different wireless services provided by different operators?

These are just a few of the questions we must address in our attempt to make the mobile Internet a reality. One important clarification is in order here: The fact that today we can use our laptop or personal digital assistant (PDA) along with a wireless device (e.g., a cellular phone or WLAN adapter) to establish access to our Internet/intranet e-mail or other Internet Protocol (IP) services does not really mean that the mobile Internet is already available. In reality, what is defined as the mobile Internet is far more complex than that. By definition, the Internet is a network of millions of users who communicate by means of standard Internet protocols. Therefore, in the mobile Internet we also need to support millions of always-connected mobile/wireless users. The key phrases we need to bear in mind are "always connected" and "millions of users." To be "always connected" means that we do not have to make a connection before every transaction or after we change wireless service. Our assumption is that we always have connectivity to public Internet services and that we are always reachable through a public IP address, no matter where we are. This calls for extensive mobility management and seamless handover across different wireless networks. And we do need several wireless networks (and several wireless technologies, as we will see later on) because no sole wireless network can provide ubiquitous wireless services, and therefore no sole wireless network can meet the always-connected requirement. A typical mobile Internet user is assumed to move seamlessly between different wireless networks (or even between fixed and wireless networks), which may or may not employ the same radio-access technology. This is schematically illustrated in Figure 1.1. The seamless fashion of movement suggests that our (virtual) connection to the public Internet is transferred from one access network to the other without any actions from the user's side. In effect, this creates a virtual wireless network from the user's perspective that provides ever-present Internet connectivity.

We need also to support millions of users wirelessly connected to the Internet in order to be compliant with the large scale of users supported by the Internet. This creates capacity concerns and better explains why no single wireless network is sufficient. The capacity concerns have direct implications in several design aspects. For instance, the wireless technology needs to be as spectrum efficient as possible; it has to implement a random access scheme that can accommodate a large number of users and degrade gracefully in overload conditions; the IP addressing scheme should be able to support the required user capacity; and the end-toend transport schemes and applications should probably take mobility into account.

It is interesting to note that most research projects nowadays, as well as standardization activities, are moving around such goals. In this context, the correlation between the mobile Internet and the so-called beyond third-generation (3G) technologies is evident. In reality, most of the beyond-3G technologies are tailored to support the requirements for mobile Internet: increased capacity, quality of service (QoS), mobility, security, TCP/IP enhanced performance, and integration of diverse technologies into one ubiquitous virtual network.

Colorize your old Black and White photos with Photoshop

Well you must be seeing many of your local studios' ads that say Black&White to Color. Well don't waste money by paying them. You can do it at you home with just a PC and Photoshop installed. Get your photos scanned and open it in Photoshop.



Note: I am using a pic of our lovely Ash for this tut. (Also this may not be the simplest way of getting around things.)




1) Open your photo.



2) Image---->Mode---->RGB Color (if it's not already in that mode)



OK. Now in this pic there are various elements that need to be colorized. There is skin, her dress, the background etc. (well, it'll depend on your image)



3) Take out your Lasso Tool and make a selection around the skin area.






TIP: When using the Lasso Tool, select while using Shift key to add to you existing selection. This comes in handy while selecting different parts together like face, hand etc. Similarly use the Alt key to minus from the existing selection.



4) Right-click inside the selected area and click the Layer via Copy option. (We are doing this coz we don't want to damage the original image.) . In the Layers window (Window---->Show Layers) right-click on the newly created layer and click Layer Properties and rename the layer to Skin.



5) Image---->Adjust---->Variations. Feel free to play with the colors here and select the most appropriate color for the skin.

How to secure your Linux Box : Part 1

1) Password: The first step in making a Linux box secure is for you to realise that good passwords are back bone of Linux security. An easily guessed word or date or a dictionary word for that matter are as bad a password as none at all. The amazing thing is that even weak passwords can be turned into strong ones pretty easily. If you love your name and you always remember a particular date (may be your gf's b'day? ) then combining both of them in a random order might be a very good idea. For example: 14ab07ha19y83 is a way better password then just 'abhay' or '14071983'. Even better would be if you could add a few special characters to it like this 14ab#$07ha&^19y83. Yes the password is extremely difficult to remember thus you must practice it before you apply it to something as important as your root account.
If you are not smart enough or you are too lazy to make good passwords for your self then give a visit to
AllSeek.NFO or
TechZoom
The former is a better link as it also gives you a way to say your password so that you can remember it easily.
NOTE: I strictly recommend you making your own passwords instead of using such tools.

2) Securing LILO: Before everyone pounces on me by saying that "Oh!!! Start using GRUB", I would like to say that I am a bit old fashioned. Yes, I like LILO and love to stay with it but not with a HUGE flaw in its security. Before I go on explaining you as to how you can remove this major loophole, I would like to explain what it is.
If you are using LILO then rather than just pressing "Enter" key on the LILO prompt, write this on lilo prompt.
Code:
 linux single
or
Code:
 linux 1
You can see that I am just adding single or 1 after the word linux (this is the label with which you identify your Linux snippet in lilo.conf) and telling LILO to boot into single user mode. This single user mode will log you or any other smart-a$$ friend of yours in to a root shell where you can do everything you desire.
Some distros have grown out of this vulnerability and now add sulogin to their start up scripts. This will ask you for a root password once the system boots before taking you to the root shell but then there is a work around to this security as well by doing the following at the lilo prompt.
Code:
 linux init=/bin/bash

Types of E-Commerce Technology

Types of E-Commerce Technology

The global economy may have faltered in 2002, but advances in e-commerce technology continue to transform personal communication and global business at an astounding pace. Although these advances promise to bring a substantial percentage of the world's population online in the next five years, they also present significant challenges to industry and policymakers alike.
According to NUA Internet Surveys (http://www.nua.ie/surveys/), over 620 million people worldwide are linked to the Internet. Experts predict that global Internet usage will nearly triple between 2003 and 2006, making e-commerce an ever more significant factor in the global economy. Estimates suggest that by 2009, some 47 percent of all business-to-business (B2B) commerce will be conducted online.

E-Commerce Technology
With the preceding in mind, the dynamic nature of the new economy, and particularly the Internet, calls for decision makers to develop policies that stimulate growth and advance consumer interests. But, in order to create the foundation for the rapid growth of e-commerce, enterprises must adopt the effective e-commerce technology policies that embrace the following four crucial principles:

Strong intellectual property protection: Innovation drives e-commerce technology, and rewarding creativity fosters innovation. Thus, strong copyright, patent, and other forms of intellectual property protection are key to invigorating the information economy.

Online trust: security and privacy: Without consumer confidence in the safety, security, and privacy of information in cyberspace, there will be no e-commerce and no growth. Protecting information and communications on the Internet is an absolute prerequisite to the continued success of the Internet and the information economy.

Free and open international trade: Closed markets and discriminatory treatment will stifle e-business. The Internet is a global medium, and the rules of the information economy must reflect that fact. Only in an open, free market will the Internet's potential be realized.

Investing in an e-commerce technology infrastructure: Supporting the physical infrastructure necessary to deliver digital content (primarily through telecommunications deregulation and government efforts to reduce the digital divide)

Creating an AWESOME signature!

I've come up with a simple tutorial to create an AWESOME signature....


1)Open a new document with height 100 pixels and width 450 pixels (or use the desired size of ur signature)

2)Filter--->Render--->Clouds (Make sure your foreground color is black)

3)Filter---->Distort---->ZigZag and use the following settings

Amount: 100 %
Ridges: 4 %

Your image should now be looking like this...




4)Image--->Adjust--->Hue/Saturation (CTRL+U). Tick the Colorize option.
Feel free to play with the colors here. I used the sittings:
Hue: 256| Saturation: 50 | Lightness: 0

You just created the background for ur siggie.



NOW FOR A BIT DIFFICULT PART:

5)Create a New Layer (CTRL+SHIFT+N)

6)Select the Rectangular marquee tool and make a selection like:



7)Edit--->Fill--->Use: White
Also deselect the marquee (by clicking somewhere outside the image)

8)Layer--->Layer Style--->Blending Options....

a)Make Opacity: 50%
b)Select Drop Shadow (with default options)
c)Stroke with Size:1 and Color: Black

Now it'll be:


9)Next select the Text tool and type your name or whatever u want in such a way that the font size is not larger than the white patch..... Now drag the text onto the white patch...

Final Image:

Network Guide Part 5 - Network Operating Systems

Network Guide Part 5 - Network Operating Systems

Every network today uses some form of software to manage its resources. This software runs on a special, high-powered computer and is called a network operating system (or NOS, for short). The NOS is one of the most important components of the network. We will look at four of the most popular network operating systems:

* Novell NetWare

* Microsoft Windows NT

* Unix

* Macintosh OS (Mac OS)

NetWare, developed by Novell, was the first network operating system to gain wide acceptance in the PC market. Windows NT, introduced by Microsoft in 1993, is gaining market share as of late because of its ease of use. Unix, while being the oldest network operating system, is only starting to gain popularity with PC users through PC-based flavors of Unix, such as Linux. This rise in popularity is due in part to the Internet, which is based on Unix standards and protocols. The fourth network operating system in use today—though used in a much smaller part of the networking market—is Apple's Macintosh OS, also known as the Mac OS

Installing Audigy 2 drivers and Software for Live! /Audigy cards.

Install drivers meant for the Audigy 2 and enjoy the added benefits


Requirements


1) Audigy/ SB Live! Sound card
2) Latest drivers and software suite for Audigy 2
3) Creative Compatibility Patch
4) Driver Cleaner.

Downloading stuff:


First off download the creative suite for audigy 2 from

http://users2.ev1.net/~dallasstar/a2..._multilang.rar
ftp://server.topo.auth.gr/topolab/te..._multilang.rar

Download updates from
http://www.asia.creative.com/support/downloads/

It's a huge download around 119Mb. Download the creative compatibility patch from
-http://members.aol.com/dvdking2001/Pub/ctcomp.exe

Also download Driver cleaner from either
http://www.majorgeeks.com/download3214.html
http://www.drivercleaner.net/download/DC3Setup_33.zip

Patching:

After downloading the audigy 2 drivers extract them to a directory of your choice.

Telnet Basics

A tutorial on telnet for beginners. Explains what telnet is and how to use it.

First of all what is telnet ?
Telnet is a protocol which is part of the TCP/IP suite. It is quite similar to the UNIX rlogin program. Telnet allows you to control a remote computer from your own one. It is terminal emulation software. In the old days harddrives were humonguous and expensive (i am talking waY back here) and there were no personal computers. To make use of existing computers you had to lease hardrive space and use terminals to operate the system. For developers this was great because computing became lots cheaper. You needed a server and many connections could be made. With telnet u can emulate this type of distributed computing and for example operate a supercomputer from a distance.

TCP/IP works with ports and telnet has one also. It's nr 23. It's has several rfc's. Nr 854 dates back to 1983 and is named telnet protocol specification.
With telnet you can do various things like send mail, log in to irc or proxy and even (though hardly anymore) view and modify websites. There are telnet services available allowing you to search through large databases using telnet. With this you use the remote computer's power so it won't presure your precious resources. Usually help or remotehelp are the commands to use to find out what you can and cannot do. If you can't see what you type in then set echo. Once you made a connection you can use the computer as if it was your own. You use command lines for this.
Telnet knows different emulation types. VT-100 is most used. This emulation was used on the video terminals of DEC. There are still VT-100 servers running out there. Scientists use these.

To use telnet you need a client. Windows has telnet built in by default (as does UNIX but that's a different story), but there are third party clients available on the net. You start a telnet session by typing in the command 'telnet server.net 23' where the port number is optional. Since Telnet was based on UNIX (as it is part of TCP/IP which also was based on UNIX) it uses UNIX commands. Basic knowledge would help you here. The port number specifies what services you will use. 23 is the default one. You can log into various services. 80 is the HTTP server for that.
So say you wanted to modify your site from a distance on a leased line. You don't have your fav progs and hardly any time.
/* telnet server.net 80 (leave the /*)
/* GET http://www.server.net/YOURSITE.HTM HTTP/1.1
You can use this method to get the output of a cgi-script as well. The simple request doesn't use the HTTP/1.1 (this is the HTTP version running on the server). If you perform a bad request you usually get some info on the server. Use this to find a the correct versions of services running.
To put files to the server u use the PUT command. Telnet is pretty simillar to FTP which is also part of TCP/IP. There are other commands available like POST, which is used to put larger data files to the server, HEAD to get the sites header and DELETE. This one is obvious isn't it.
You can also use telnet to send raw imails. The port to login to is 25.
First you have to identify your self. This geos like this:
/* telnet mail.server.net 25
/* HELO www.you.net
When you typed this command you'll get some feedback telling you who and what you logged on to. When you login u may get also some feedback telling you things. :`;
After this you tell the server where the mail is from like this:
/* MAIL FROM:you@youradress.net
The server will give you feedback again telling you
/* ...Sender OK

Cracking Unix Passwords John the Ripper

1) First thing's first
================
Ive read few tutorials . This is a torn down version of what ive collected .Tell me if u liked it. Sometimes, even if you are experienced in password cracking, you won't be able to crack the password or even get your own password. This is a pure technical manual and will give you only the recipe for cracking, but every password needs different approach...

OK, so a good way to get somewhere is to start getting somewhere...
What you're about to learn is to crack *nix(Unix/Linux/etc.) password files. It does not mean that you need to have some Unix distribution on your box, but it means you'll have to stop clicking your ass off all around the screen... 'What this fool is trying to say', you'll probably ask... This fool is trying to say that john is a DOS program (there is also Linux/Unix version, but I guess that most of the people that read this tutorial have win boxes). I will try to put this tutorial through the examples so it wouldn't look like a boring script with incredible amount of switches. After reading this text it wouldn't be a bad idea to look at the texts you get with John. I learnt it all from there, but that, of course, was the hard way, and you want the easy way, right? Right.

First, it wouldn't be a bad idea to get yourself John the Ripper, I guess... if you don't have it you can find it at:

1) packetstorm.securify.com (look at archives, password cracking)
2) neworder.box.sk (do some searching by yourself)

John can be found practically anywhere. For example: try going to altavista.com or google.com and running a search for 'john the ripper'.

Second thing you'll need is.... a HUUUUGE amount of password dictionaries (I'll explain what these are in a minute). The best dictionary around is at www.theargon.com and packetstorm (look at the archives) and is called theargonlistserver1 and is about 20Mb packed, and over 200Mb
unpacked... get it!!!! The people at theargon did a terrific job.

You should also get some smaller dictionary files (I'll explain why later).

2) Do we look like *nix?
========================
So now you have john, loaded with that huuuuge pass dictionary, and you think that you can crack anything... If you plan to live for 100000 years, that wouldn't be a problem, but you only have some 80 years left in the best case scenario (unless, of course, scientists find a way to... oh, nevermind).

Now, the first thing is that you have to make sure your password file really looks like a Unix password file (were talking about the /etc/passwd file).

Let's see how Unix pass files look like

owner:Ejrt3EJUnh5Ms:510:102: Some free text:/home/subdir/owner:/bin/bash

The important part is the username and the encrypted password, which are the first and the second parts (each line is divided into seven parts by : symbols)

owner:Ejrt3EJUnh5Ms

Owner is the username and 'that other thing' is the crypted password (encrypted in altered DES (Data Encryption Standard) encryption). For the other part you can put anything that looks like that but the structure must be same so the john could recognize it as unix pass. In fact the other part

:510:102ome free text:/home/subdir/owner:/bin/bash

Is just some information about the user, his home directory, etc...

Sometimes you'll have passes that have only the first and second part, such as password files that you got from a webboard running matt's web board script.

Mounting NTFS partitions for linux

I recently changed my file system to ntfs... i run win2k. dual boot=rh9

so i had to remount my partitions as they were of a diff. fs.

here's how to do it.

open a terminal window

1. Create a directory in your /mnt folder. This can be done by running mkdir/mnt/test where test is the name of the directory where the NTFS partition will be mounted.

3. Run fdisk -l and note the name of the device file for the NTFS partition. Lets say the device file name is found to be /dev/Y.

4. Open the file /etc/fstab in a text editor.

5. add the line at the bottom(newline)

/dev/Y /mnt/test ntfs users,owner,ro,umask=000 0 0

where test is the name of the directory you created in step 1.

6. Save and quit the file /etc/fstab

7. Then run mount -a and the NTFS partition will be mounted. It will also be mounted automatically after reboot so that you do not have to do anything after you reboot.



VERY IMPORTANT!!
This will allow all users READ ONLY access to the NTFS partition. Write access to NTFS partitions is still considered very risky (see http://linux-ntfs.sourceforge.net/info/ntfs.html#3.2 ).

[GUIDE] Make Autorun Divx CDs

I found this decent utility which you can use to make Autorun CDs of videos.

I felt like putting up a step-by-step for this :) ( maybe will save some of your time ;) )

Basically coz my net wasn't working, so I "invested" my time in this...

--

1] Download CDA (CD Autorun) from cda-0.2.1.1.zip

Download Media.Player.Classic from mpc2kxp6482.zip

2] Unzip both into a folder on a large partition. eg. g:/cd

3] Copy your videos to this folder, rename them in order that you want. eg. 01.avi, 02.avi...

4] Run autorun.exe



5] Now lets configure the buttons. Click on the first empty button



6] Enter required info. in the fields as shown in this image..



Similarly configure for rest of the clips, just remember to give correct path for files. Don't ever use "absolute paths" ,like, d:\bla.avi. Instead put everything in one folder for the sake of simplicity.

7] Now go over and download this Divx511.exe
Put the exe in that folder as well

8] Now configure a button to give the user an option to install the required codeccs. See the image below for an eg.



9] Goto cdcovers.cc and get a copy of whatever movie your are making this CD for.

10] Put the DVD cover image into that folder, give it a simple name. eg. front.gif

Then Goto settings > Image Properties and set it up like this

Useful DNS Commands

Introduction
These days most people manage their hosting using powerful and easy-to-use control panels that automate most tasks. But for some things, it is hard to beat the power of the command-line. These DNS commands are powerful tools, and this article should provide you enough information to get you started or offer a quick refresher if you already use these commands.

The Domain Name System (DNS) is a distributed, hierarchical database where authority flows from the top (or root) of the hierarchy downward. When thinking of the structure of the DNS, imagine an inverted tree. Each branch of the tree is within a zone of authority; however, multiple branches of the tree can be within a single zone.

The software (Bind being the most common) that stores domain name information is called a domain name server. A single name server can be authoritative for multiple zones. All zones have a primary master and a secondary master name server that provides authoritative responses for their zones.

If you query a name server not authoritative for a particular zone, that name server will most likely have up-to-date information. This is because zone information propagates throughout the Internet at regular intervals, and name servers cache zone information for which they are not authoritative.

DNS Commands

There are three crucial commands that can put all the DNS information you need at your fingertips. The way to use this article is to try each of the commands listed on a domain name, so you can see what the output looks like. Learn by doing.

Zone file database records divide DNS information into three primary types: NS (Name Server) records, MX (Mail Exchange) records, and A (Address) records. NS records indicate the name servers. MX records indicate the hosts that handle email delivery; the priority (pri) number indicates the order in which mail servers are used, with the lowest number receiving the highest priority. The A (Address) records map hostnames to IP addresses, the real names of machines.
__________________

Checklist to choose a web hosting service

Before you can launch your web site, you'll need to engage the services of a web hosting company.

A web host, quite simply, allows you to rent space on a web server. Your web pages are then stored on this server, and the host computer allows other people connected to the Internet to view them.

There are literally hundreds of web hosting companies to choose from. How to choose the right one?

As with trying out any new service, you won't really know how good a web hosting company is until you try it. Therefore, ask around and see whether you can get any recommendations from those who already use a web hosting company. You might also want to consider how long the company has been in business, how reliable it is known to be, and how expensive it would be if you want to upgrade your plan in future.

Other areas to consider include:

Disk space
How much disk space do you need? Does you website have less than 10 pages? You'll need only a small amount of space. Is it a huge site that has thousands of pages? You'll be needing a lot of disk space. Most web hosting plans limit how much space you will have, so make sure the plan you choose meets your needs.

E-mail accounts
How many e-mail accounts do you need? You'll probably need one for each employee and one for each department (sales, accounts, support). Make sure you purchase a hosting plan that has enough e-mail accounts. Also, do you want full POPS access, Web-based e- mail, or both?

Data transfer
How much data do you need to transfer? Most hosting plans limit how much data transfer you are allotted each month. If you expect a lot of people to visit your site, you'll need a plan that allows for plenty of data transfer.

E-commerce
Will you be selling goods or services through your site? If not, there's no need to sign up for an e-commerce web hosting service. If you are, e-commerce web hosting services such as shopping cart software, SSL support and a merchant account will be vital.

Database, script and extension support
Some hosts will try to blind you with all the features they provide: Frontpage, MS Access, MySQL, MS SQL, Peri support, PHP support, ASP support and SSI support. Do you really need all these features? If not, make sure you are not paying for extras you'll never use.

Operating systems
Do you want a UNIX hosting plan or a Windows hosting plan? Unix is the most commonly used operating system among Web servers. It is known for its flexibility, reliability and stability. Windows hosting plans give you the ability to utilize many forms of dynamic content and specialized databases. Windows hosting plans are often used for sites utilizing Frontpage, ASP, MS Access databases, MS SQL Servers and other Microsoft applications.

Five Tested and Proven Methods for Internet Success

here are hundreds of ways that you can promote your online business or website, some more effective than others. These five proven methods will help you to generate traffic to your site and also to generate income towards your bottom line.

1. One thing that appeals to everyone is "FREE." If it is free people will take it. Think of the samples of cheese given away at grocery stores. Do you really want a small piece of cheese? Of course not! But you take it simply because it is free and someone is nice enough to offer it to you. The same principle applies with information or services offered from your website. You can send out free newsletters or offer a free trail period. One popular thing that is being given away now are free credit reports or free PC scans. These freebies are what we in the marketing field like to call teasers. After running the free credit report or PC scan we alert the customer if there was something found on their credit record or PC and then offer to show them what it is or repair the problem for a price. This can be an effective way to get information to your potential customers, create sales or to generate traffic to your site.

2. Your website contains information about a service or product that you are very knowledgeable about. You can use this knowledge to generate traffic to your site by writing articles in your area of expertise and having them published in an ezine or an article information site. The most effective way to use these articles is to write them for free and ask in return that the publisher allow you to include a byline. A byline is a very short summary of the author, their credentials and their website. Your byline is a way that readers will come to know you as an expert on the topic and will in turn come to trust your site as a source of credible information.

3. Some search engines will allow a website to purchase their ranking. This is an excellent Internet marketing technique which is effective and inexpensive. In the pay-per-click programs, websites are only billed for those who actually visit the page, unlike banner ads which may be seen by millions but only used by a few. When using the pay-per-click program you are asked to choose keywords and when those are entered, your site will appear and if the surfer chooses to view your site, you will be billed for that click. Many pay-per-click programs will offer other benefits as well, such as updated lists of commonly used keywords.

4. You should remember that others are in the same boat as you. You can choose to network with those who have similar marketing ideas. When networking you will be able to share links and refer customers to each other. You should always be very cautious when choosing a networking partner as everything that you recommend is a reflection of yourself or your product and therefore, you should be certain that your networking partner is a reputable source of information.

5. Simply because your website is online, doesn't mean that all your advertising must be. Advertise in newspapers, TV, radio or you can even send out a press release to get your information to thousands of people all over the country.
__________________

Driver XP - A Windows XP Driver Guide

Installing the latest drivers improves system performance and application compatibility. Updated drivers include numerous bug fixes as well as system optimizations. It is recommended for optimal system stability to only use Official drivers and not Beta or Prerelease versions. Performance differences between driver versions including Beta or Prereleased drivers is negligible. The only time Beta or Prerelease drivers should be considered is when a serious application bug is fixed in the Beta or Prerelease version and the component manufacturer has not yet released the Official driver version that includes the bug fix.

Java Programming Language Basics: Reflection Basics and Class Class

1. Reflection Basics:
The standard J2SE platform libraries include a reflection API. This API allows classes to reflect on themselves, to see their inner selves. Typically not used by developers, but by tool developers such as those creating an IDE like NetBeans, the reflection API lets you discover the names of classes, methods, and fields. Just finding out the names isn't all you can do though. You can also invoke those methods and access arrays without using square brackets.

The heart of the reflection API is the Class class. This class allows you to find out the name of a class, its access modifiers, fields, methods, and so forth. For any instance of a class, you can get its Class class by calling the getClass method:

Class c = anInstance.getClass();

If you don't happen to have an instance of a class (and don't want to create one), just attach .class to the end of the class name and you have the Class instance for that class.

Class c = MyClass.class;

The same even works for primitives:

Class c = int.class;

This last one might seem odd, but it allows you to specify argument types when calling methods (via Reflection) that accept primitive arguments.


One thing typically done is creating a Class by passing its string name to the forName method of Class.

Class c = Class.forName("java.awt.Button");

This is very common in JDBC technology. This is done so is that so that at compile time you don't have to have the class within the quoted string available. So, if you change JDBC drivers, you won't have to recompile your program if the driver's class name was the quoted string.

Note: When naming the variable for the Class instance, don't name it class. As this is a reserved word, the compiler will think you are trying to define a new class in an inappropriate spot.

Once you have a Class class, that's where the fun begins. You can find out the name of the class with its getName method.


Class c = javax.swing.JButton.class
System.out.println("Name: " + c.getName());

Or, you can find out its superclass with getSuperclass:

System.out.println("Super: " + c.getSuperclass().getName());

[Yields javax.swing.AbstractButton in the case of the JButton.]

Moving from classes to methods takes us to the Method class, found in the java.lang.reflect package. With the Method class, you can discover all methods of a class (with getMethods) and even invoke them (with invoke).

The following program demonstrates getting the methods of a class, where the class name comes from the command line.

import java.lang.reflect.*;

learn asp nice and easy

hay guys its my first thread so plz stay calm in casse of any mistake and do let me know

overview of asp
ASP stands for Active Server Pages. ASP is a server side technology which is used to display dynamic content on the web pages. ASP is becoming popular day by day as the favorite server side technology. ASP in itself isn't a language actually, instead it uses VBScript or JScript to display dynamic content. ASP is more of a technology used by VBScript / JScript on the server side. So if you know VBScript or JScript you can start creating .ASP pages right now.

I will assume here that you are not familiar with VBScript, the language of choice for creating ASP pages. So I will also give you a little insight into VBScript too. But a general understanding of HTML is required.

requirements
You must be wondering what is required to run an ASP page ? well if you are running windows then you can download Personal Web Server ( for Win95 & Win98 ) or Internet Information Server ( for WinNT ) from www.microsoft.com. If you are running Windows 2000 then you have got IIS 5 already, you just need to install it. Just go to the 'control panel' and click the 'Add/Remove Programs' icon. Then on the left click the 'Add/Remove Windows Components' button, a window will appear offering you a lot of choices. Just check where 'Internet Information Services' is written and click 'Next', your IIS 5 will be installed. For those of you who are running other operating systems please take a look at www.chilisoft.com. They offer ASP solution for those of us not running Microsoft Windows. Please note that Chilisoft products are not free but you can download PWS or IIS free of cost from Microsoft's web site above.


Installing Personal Web Server
If you are running Windows 95/98 then you will most probably be needing PWS to run .asp pages. Just in case if you don't know what PWS stands for, PWS stands for Personal Web Server. If you have got Windows CD with yourself then you can install PWS from there. Or if you want then you can download the latest version of Personal Web Server from www.microsoft.com. Installation is all very easy. Just run the setup file and PWS will install just as any other application is installed on your system. I will advise you to accept the defaults when it comes to giving the location as to where the 'inetpub' and 'wwwroot' directories should be installed. Once the setup finishes you will most probably be ready to run the PWS.

After the installation of PWS, you will find a PWS icon on your desktop and probably a PWS small icon in the tray on the right lower corner of your desktop too. Double click any of them to bring up the PWS control window. If the PWS is already running then you will see an option 'Stop PWS'. But if PWS has been stopped and is not running then you will see the option to 'Start PWS'. Since we want to check that PWS has installed successfully and everything is running optimally, you should start the PWS if it is not already running. If it has started on its own then don't do anything.

Ok, now we want to check if PWS is running correctly and Active Server Pages are running or can be run. Open your Internet browser e.g. Microsoft Internet Explorer. In the URL box enter http://127.0.0.1 and press enter. If all is well then you will see a default page generated by PWS. When you install PWS it also sort of builds a default web site on your system, and that is what we tested here. If you can see some page then PWS is running correctly and we are done. But if PWS is running and you cannot see any page by entering the above URL then you might need to restart your computer and then start PWS again and then open your browser and enter the URL as given above. Hopefully everything will be alright now. Installation of PWS is very eay and most of times everything is done without any problems.

Note that to see .asp pages you cannot see them just be opening them in browser without the 'http' protocol. You have to appendhttp://127.0.0.1/ before the page name and address to see it running on your own local computer. More on that later. For now you have successfully installed PWS and now we are ready to create some simple Active Server Pages.

Your first ASP page
Open you favorite text editor ( notepad ). ASP pages may be developed using expensive editors like Microsoft Visual Interdev but that is out of scope as far as this tutorial is concerned. So notepad is all we need.

Here we will be using VBScript for writing .asp pages. Note that you can also use JScript or PerlScript to write Active Server Pages. Write down the following in your notepad :
<html>

Best Google Searching Tips

This How-To will teach you how to use google to find mp3s. This How-To
will be highly pragmatic and will focus on the hows and not the
wherefores of the various search strings.

Index
----------------------------------------------------------------------
0) Key
1) Directories
2) Xitami Servers
3) Directory Listing
4) Andromeda Servers
5) Zina Artists
6) Apache mp3 Servers
7) Individual Songs


----------------------------------------------------------------------
Section 0 - KEY
----------------------------------------------------------------------

You this are just some definitions I will use below.

[Directory String] can be any of the following :
1) "index of"
2) "last modified"
3) "parent of"

[file type] can be any of the following :
1) "mp3"
2) "shn"
3) "wma"

[mp3 name] can be any of the following :
1) the name of the album in quotes
2) the name of the artist in quotes
3) be daring and leave it blank and have lots of links
4) be creative!

[limitors]
1) -html -htm -php -asp -txt -pls

(inurl is optional and may be omitted and in fact most be
omitted if not using a search tool other than google.

(intitle can be used in place of (inurl and has a similar effect
again you must be useing google.

(-filetype:txt) adding this to the end of your search string can
filter some false positives.

(-playlist) adding this to the end of your search string can
filter some false positives.

----------------------------------------------------------------------
Section 1 - Directories
----------------------------------------------------------------------

These are the most common way that mp3s are stored on the www, you
should try these strings first.

String Format :
Type 1 : [Directory String] + (inurl[file type] + [mp3 name]
Type 2 : [Directory String] + (intitle[file type] + [mp3 name]

Type 3 : [Directory String] + [file type] + [mp3 name] + [limitors]

Example Strings :
- intitle:index.of + mp3 + "grandaddy" -html -htm -php -asp -txt -pls
- "index of" + "mp3" + "radiohead" -html -htm -php
- "index of" + mp3 + "grandaddy"
- "index of" + inurl:mp3 + "beatles" -txt -pls
- "index of" + intitle:mp3 + beatles
- "last modified" + "shn" + "dylan"
- "last modified" + inurl:shn + "bob dylan"
- "parent of" + inurl:wma + "grandaddy"

Suggestions :
- Try (intitle:index.of + "mp3" + "band name" -htm -html -php -asp) first it
is usually the most effective.

Another Little Trick:
- If you have been getting alot of results on google but the pages don't seem
to be there try adding dates and the "apache" string to your search i.e.

- intitle:index.of + mp3 + "grandaddy" -html -htm -php -asp apache feb-2005
- intitle:index.of + mp3 + "grandaddy" -html -htm -php -asp apache 2005

or if you just want a big list of mp3' doing a search like this everymonth
- intitle:index.of + mp3 + -html -htm -php -asp apache mar

----------------------------------------------------------------------
Section 2 - Xitami Servers
----------------------------------------------------------------------

String Format :
Type 1 : "xitami web server" + (inurl[file type] + [mp3 name]
Type 2 : "xitami web server" + (intitle[file type] + [mp3 name]

Example Strings :
- "xitami web server" + "mp3" + "radiohead"
- "xitami web server" + intitle:shn + "beatles"
- "xitami web server" + inurl:mp3 + "magnetic fields"

Making Win Xp 60% Faster

Tutorial :Making Win Xp 60% Faster


Whenever you start your computer, you are faced with a few moments of thumb twiddling while Windows XP boots and prompts you to log on. Although you should expect to wait for a few moments, sometimes Windows XP seems to boot rather slowly. In fact, you may notice that over a period of time the PC that used to roar to life seems a bit sluggish instead. Fortunately, you can perform several techniques that help Windows XP get the bootup speed you want. This chapter explores how to put these techniques to work.

Stopping Unneeded Startup Services

Along with the core operating system and programs that Windows XP runs when it starts, there is also a host of services involved. Many of these services are necessary for Windows XP to operate correctly. However, many of them are for features in Windows XP that you may not use at all. You can peruse the services and disable any service that you do not want to run. The fewer services that run, the more quickly Windows XP will boot.


Caution:
Exercise caution when stopping services. If you do not know what a service does or are unsure of the ramifications of stopping the service, leave it alone. Some services are critical to Windows XP's operations, so make sure you understand what the service is before you disable it.


To reduce the number of services that start on bootup, you can access two different areas of Windows XP. The first is the System Configuration Utility. The Services tab shows you the services that start when the computer boots.

You can stop a service from starting by simply clearing the check box next to the service and clicking OK. However, before you do so, there is another way to disable services that you may prefer because the interface gives you more information about the service in question.

Open Control Panel/Administrative ToolsServices or else select Start/Run, type services.msc, and click OK. Either way, you see the Services console.

I prefer to use the Services console instead of the System Configuration Utility because it describes what the service does. Additionally, you can double-click a service and examine its properties.

Notice the Startup Type column in Figure 4-2. This information lists whether the service is automatic or manual. Manual services are only started in Windows XP when you start a process that requires the service. Some other process may require the service that has a "dependency" relationship with it; in this case, the dependency service will start, as well. Because these services do not start automatically when you boot Windows XP, you do not need to do anything with manual services.

However, all services listed as automatic start when Windows XP boots. These are the services that increase boot time. As I have mentioned, many of them are necessary and important, so you should not stop automatic services from booting unless you are sure of the ramifications. You can get this information by looking at the Description column. Here's a quick look at common services you may want to live without:


Automatic Updates: This service enables Windows XP to check the Web automatically for updates. If you don't want to use Automatic Updates, you can disable the service. You can always check for updates manually at the Windows Update Web site.


Computer Browser: If your computer is not on a network, you don't need this service. If you are on a network, leave it alone.


DHCP Client: If you are not on a network, you do not need this service. If you are on a small workgroup, you can still increase boot time by configuring manual IP addresses (which I explore later in this chapter).


DNS Client: If you are not on a network, you do not need this service. If you are, leave it alone.


Error Reporting and Event Log: You don't have to use these services but they can be very helpful, so I would leave them configured as automatic.


Fax: If you don't use your computer for fax services, you can disable this one.


Help and Support: If you never use the Windows XP Help and Support Center (found on the Start menu), you can disable this service.


IMAPI CD-Burning COM: This service enables you to burn CDs on your computer. If you never burn CDs, you can disable the service.


Indexing Service: Your computer keeps an index of files but if you rarely search for files, the service is just a resource hog. You can stop it and turn the service to manual.


Windows Firewall/Internet Connection Sharing: If you do not use these features, you can disable them.


Infrared Monitor: If you do not use infrared devices, you can disable this service.

Tuesday, April 26, 2011

Google Earth - Guide of the Traveller

From its exit in August 2005, Google Earth became a true phenomenon.
The receipt of its success? A brilliant concept (even if it is not new
as we will see it) and an impeccable technical realization. The goal
of the software? To provide an urban and geographical guide total,
based on a representation 3d detailed and realistic of the Earth. In
theory, Google Earth makes it possible to seek imports what on our
beautiful planet: a pizzeria, a historic building, a route of its
hotel to the cinema nearest. The software posts a level of detail such
as one can even have access to a modeling 3d (simple) of the buildings
over the detailed satellite images, themselves and taking account of
the relief. Sum colossal of information is diffused in "streaming"
since Internet (even if the images satellite can go back to a few
years), in short, Google Earth is a mine of information on our planet,
constantly updated.

In practice, unfortunately, all that relates to currently only the
United States: the buildings are reserved for 38 cities American and
only some European cities have a level of high detail and information
practical. Would Google Earth be thus a simple gadget with the
interest limited for the remainder of planet? Certainly not! The force
of the software is indeed to make it possible to the Net surfers to
add their own information. Simple "bug" on the sphere with modeling 3d
of a monument or a building, it is thus possible to personalize Google
Earth with its own way and to benefit from innumerable information
brought by a very active community.


Earth with range of mouse: To discover Google Earth

Let us start with the beginning, namely the remote loading of the
software. Google Earth exists in several versions. The paying versions
propose additional functionalities like the possibility of adding
buildings in 3d or functions related to the GPS, but the free version
is obviously sufficient to explore the Earth under all its seams.
Google Earth is available under Windows and Mac OS X (10.3 minimum)

Before launching us to the research of the villa of Zidane or desert
of Tatooine, we with the interface of the software, broken up into
three parts familiarize already:
The principal window.
The panel of navigation.
The side panel.

Prevention & Solution For Safe Computing

At the very least you need a spyware and virus protection program.
Usually two spyware programs are a good idea, but only one full time
loaded virus program is sufficient. Some are more resource intensive
than others, can slow your system down, and be a real pain to
uninstall later. Norton fits in this category, but many people are
happy using and paying for it. AVG Free is, of course free, and
provides real time protection.

For Spyware there are a lot of safe, and free choices. AdAware and
Spybot are my personal favorites, but others use SpySweeper and
others. Some of these programs are for removal, others are for
protection from infestation. A program like CCleaner is also VERY
helpful.

Be warned that there are MANY spyware prevention programs that are
just that -spyware! Be careful of programs that you do not see on this
list.

Any of these spyware programs should be updated first, then turn
system restore off and run it in Safe Mode (F8 at boot time before you
see the Windows logo). Anything found can be deleted safely.

Occasionally more resistant malware is found and Ewido can be helpful
for getting these trojans on Windows 2000 and XP systems only. The
above suggestions for running in safe mode with system restore off is
applicable. The reason is that a restore can be harboring malware, and
without doing this you run the risk of reinfecting the system.

Any unknown popup that says "Your computer has a problem. Click here
to fix it" or similar should be a red flag. Do NOT click on the link
or you will definitely be further infected. It also requires that you
deal with the problem immediately with the above action.

Setup your own FTP server

Register free at the page. (follow all the instructions you get there)
Look at the top, and you see the Host search. write the name you want,
and press GO! Then download the program called NO-lP on the site.

Download and install the software, then write you're registerd
username and password in the requested fields. A smiley face should
now appear in the program box. Press the box next to it, and I will
change to a happy face. press it again, and you have you're ip guided
to you're registerd host name.
You have to press the smiley every time you log on to the internet.
If you are connected all the time, you whont have to do it again, but
try to make sure. It will tell you if you are guided to you're host
name or not.

That was the basics. Now it's time for getting this thing'online.

Got to w*w.bpftpserver.com

it's a pay prog. you can crack it or buy it) Download Bullet proof FTP
server, and install it. Start the program, and you will see a big
white screen, and some icons on the top.
press the lightning, and it will say: (example)

31.07.02 10:41:22 - FTP Server on-line : IP(S)
192.168.1.10,80.212.4.10, on port 21

Then"youpres-s .-the-human ,head nr '6` from-the right) Right click
under user accounts, and choose ADD, Make an account for you're self,
and press ok. Mlnimize the program, and go to the internet again. Go
to

How Domains Work.

When you use the Web or send an e-mail message, you use a domain name
to do it. For example, the URL "http://www.techarena.in" contains the
domain name techarena.in. So does the e-mail address
"someone@techarena.in."

Human-readable names like "techarena.in" are easy for people to
remember, but they don't do machines any good. All of the machines use
names called IP addresses to refer to one another. For example, the
machine that humans refer to as "www.techarena.in" has the IP address
207.58.143.178. Every time you use a domain name, you use the
Internet's domain name servers (DNS) to translate the human-readable
domain name into the machine-readable IP address. During a day of
browsing and e-mailing, you might access the domain name servers
hundreds of times!

Domain name servers translate domain names to IP addresses. That
sounds like a simple task, and it would be -- except for five things:

*There are billions of IP addresses currently in use, and most
machines have a human-readable name as well.
*There are many billions of DNS requests made every day. A single
person can easily make a hundred or more DNS requests a day, and there
are hundreds of millions of people and machines using the Internet
daily.
*Domain names and IP addresses change daily.
*New domain names get created daily.
*Millions of people do the work to change and add domain names and IP
addresses every day.

The DNS system is a database, and no other database on the planet gets
this many requests. No other database on the planet has millions of
people changing it every day, either. That is what makes the DNS
system so unique!

Reverting Back to iTunes 6

Apple Recently released iTunes 7, being a avid iTunes user, i nearly
screamed in Happyness "Finally v7.0" unfourtunetly, iTunes 7 is a bad
bad bad rush job, with tremendous stabilty issues along with a million
other bugs, only after installing iTunes 7 did i realise this (until i
personally use something, i don't care about other people's
expierence) before installing version 7, i was more than happy with
version 6.0.5.20, If you're a Avid iTunes user and want to revert
back, simply Uninstalling and reinstalling previos version won't work,
Hunting on Google, i founded this VERY useful tutorial, which finally
letted me use v6 again.

Quote:
Step 1: Backup
Back up your iTunes 7 settings, so that you can keep them around in
case you want to go back.

Go into your My Documents folder, then your My Music folder. Copy the
iTunes folder inside there to somewhere else. That'll save your
settings.

Note: That's the default location, if you've moved things around it'll
be somewhere else. If you need help finding it, search for files
ending in .itl on your hard drive.

Step 2: Uninstall iTunes 7
Now, uninstall iTunes 7. Go to your Control Panel, Add/Remove
Programs, iTunes and hit Uninstall.

Reboot as it asks you to when it's done.

Step 3: Download iTunes 6.0.5
Download iTunes 6 from Apple:
http://www.apple.com/support/downloa...orwindows.html

Step 4: Install iTunes 6.0.5
Install iTunes 6 by running the installer.

Step 5: Try to run iTunes 6
You should get this error message:
The file "iTunes Library.itl" cannot be read because it was created by
a newer version of iTunes.

Step 6: Restore your old library
Go back into My Documents/My Music. Now go into the iTunes folder.
Rename your iTunes Library.itl as iTunes Library.itl.old. Go into the
Previous iTunes Libraries folder (which would be in
MyDocuments\MyMusic\Previous iTunes Libraries). Take the newest file
(for me this was iTunes Library 2006-09-14.itl) and copy it back up to
the iTunes folder. Rename it iTunes Library.itl. Run iTunes 6 and you
should be all set, with your library restored.

It's not a perfect solution, but it's better than losing your library
entirely. Plus, since you've backed up your iTunes 7 library, when
Apple releases an iTunes 7.0.1 you should be able to reverse the
procedure above and use your most current library before upgrading to
iTunes 7.0.1.
Source: Blog.Dominik.Net

Hide Recycle Bin Windows XP

BEFORE EDITING THE REGISTRY ALWAYS TAKE A BACK-UP INCASE SOMETHING
GOES WRONG! To take a Registry backup, open Registry Editor Go to
File>Export and Export the whole registry, it takes around 200-250MB
Space, for good measure, try to take a back up on a external device
like, Portable HDD, Thumb Drive or CD/DVD.
-------------------------------------------------------------

Open Notepad By Going to Start>All Programs>Accessories>Notepad
Copy Paste This Into it:

Code:
REGEDIT4

[HKEY_CURRENT_USER\Software\M$\Windows\CurrentVersion\Explorer\HideDesktopIcons]

[HKEY_CURRENT_USER\Software\M$\Windows\CurrentVersion\Explorer\HideDesktopIcons\ClassicStartMenu]
"{645FF040-5081-101B-9F08-00AA002F954E}"=dword:00000001

[HKEY_CURRENT_USER\Software\M$\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel]
"{645FF040-5081-101B-9F08-00AA002F954E}"=dword:00000001
Now Save The File As Hidebin.reg after saving, Right Click on the file
and select 'merge' or just double click on the file. Refresh and No
more Recycle Bin!

If you want to bring it back, Open Notepad and Copy paste this:

REGEDIT4

Remove Google Ads In Mozilla Firefox!

Although, Common Flash/HTML based ads can be removed from Firefox
Using AdBlock Extension, there's nothing availble to actually remove
those Google Text Framed Ads we see, you can always Right click and
Block, but that's a temporary solution, here's How you can Get rid of
those ads for once and for all!
Tools You Need:
Mozilla Firefox Browser
ChromeEdit Extension For Firefox
Download and Install ChromEdit, which let's you Edit User Files,
Restart Firefox, and Open ChromEdit (See The Screenshot)
http://img474.imageshack.us/my.php?i...fc9392b7jh.jpg

Go to userContent.css and add the following Code:

Code:
/* Block Ads v.2004-06-12 by Neil Jenkins
Portions of this ruleset are derived from the ad blocking css by
Joe Francis at:
http://www.floppymoose.com/
Some code also contributed by Mike Hokenson:
http://www.gozer.org/mozilla/ad_blocking