Search This Blog

Thursday, November 3, 2011

Useful Run Command Shortcut

* Accessibility Controls : access.cpl
* Add Hardware Wizard : hdwwiz.cpl
* Add/Remove Programs : appwiz.cpl
* Administrative Tools : control admintools
* Automatic Updates : wuaucpl.cpl
* Bluetooth Transfer Wizard : fsquirt
* Calculator : calc
* Certificate Manager : certmgr.msc
* Character Map : charmap
* Check Disk Utility : chkdsk
* Clipboard Viewer : clipbrd
* Command Prompt : cmd
* Component Services : dcomcnfg
* Computer Management : compmgmt.msc
* Date and Time Properties : timedate.cpl
* DDE Shares : ddeshare
* Device Manager : devmgmt.msc
* Direct X Control Panel (If Installed)* : directx.cpl
* Direct X Troubleshooter : dxdiag
* Disk Cleanup Utility : cleanmgr
* Disk Defragment : dfrg.msc
* Disk Management : diskmgmt.msc
* Disk Partition Manager : diskpart
* Display Properties : control desktop
* Display Properties : desk.cpl
* Display Properties (w/Appearance Tab Preselected) : control color
* Dr. Watson System Troubleshooting Utility : drwtsn32
* Driver Verifier Utility : verifier
* Event Viewer : eventvwr.msc
* File Signature Verification Tool : sigverif
* Findfast : findfast.cpl
* Folders Properties : control folders
* Fonts : control fonts
* Fonts Folder : fonts
* Free Cell Card Game : freecell
* Game Controllers : joy.cpl
* Group Policy Editor (XP Prof) : gpedit.msc
* Hearts Card Game : mshearts
* Iexpress Wizard : iexpress
* Indexing Service : ciadv.msc
* Internet Properties : inetcpl.cpl
* IP Configuration (Display Connection Configuration) : ipconfig
/all
* IP Configuration (Display DNS Cache Contents) : ipconfig
/displaydns
* IP Configuration (Delete DNS Cache Contents) : ipconfig /flushdns
* IP Configuration (Release All Connections) : ipconfig /release
* IP Configuration (Renew All Connections) : ipconfig /renew
* IP Configuration (Refreshes DHCP & Re-Registers DNS) : ipconfig
/registerdns
* IP Configuration (Display DHCP Class ID) : ipconfig /showclassid
* IP Configuration (Modifies DHCP Class ID) : ipconfig /setclassid
* Java Control Panel (If Installed) : jpicpl32.cpl
* Java Control Panel (If Installed) : javaws
* Keyboard Properties : control keyboard
* Local Security Settings : secpol.msc
* Local Users and Groups : lusrmgr.msc
* Logs You Out Of Windows : logoff
* Microsoft Chat : winchat
* Minesweeper Game : winmine
* Mouse Properties : control mouse
* Mouse Properties : main.cpl
* Network Connections : control netconnections
* Network Connections : ncpa.cpl
* Network Setup Wizard : netsetup.cpl
* Notepad : notepad
* Nview Desktop Manager (If Installed) : nvtuicpl.cpl
* Object Packager : packager
* ODBC Data Source Administrator : odbccp32.cpl
* On Screen Keyboard : osk
* Opens AC3 Filter (If Installed) : ac3filter.cpl
* Password Properties : password.cpl
* Performance Monitor : perfmon.msc
* Performance Monitor : perfmon
* Phone and Modem Options : telephon.cpl
* Power Configuration : powercfg.cpl
* Printers and Faxes : control printers
* Printers Folder : printers
* Private Character Editor : eudcedit
* Quicktime (If Installed) : QuickTime.cpl
* Regional Settings : intl.cpl
* Registry Editor : regedit
* Registry Editor : regedit32
* Remote Desktop : mstsc
* Removable Storage : ntmsmgr.msc
* Removable Storage Operator Requests : ntmsoprq.msc
* Resultant Set of Policy (XP Prof) : rsop.msc
* Scanners and Cameras : sticpl.cpl
* Scheduled Tasks : control schedtasks
* Security Center : wscui.cpl
* Services : services.msc
* Shared Folders : fsmgmt.msc
* Shuts Down Windows : shutdown
* Sounds and Audio : mmsys.cpl
* Spider Solitare Card Game : spider
* SQL Client Configuration : cliconfg
* System Configuration Editor : sysedit
* System Configuration Utility : msconfig
* System File Checker Utility (Scan Immediately) : sfc /scannow
* System File Checker Utility (Scan Once At Next Boot) : sfc
/scanonce
* System File Checker Utility (Scan On Every Boot) : sfc /scanboot
* System File Checker Utility (Return to Default Setting) : sfc
/revert
* System File Checker Utility (Purge File Cache) : sfc /purgecache
* System File Checker Utility (Set Cache Size to size x) : sfc
/cachesize=x
* System Properties : sysdm.cpl
* Task Manager : taskmgr
* Telnet Client : telnet
* User Account Management : nusrmgr.cpl
* Utility Manager : utilman
* Windows Firewall : firewall.cpl
* Windows Magnifier : magnify
* Windows Management Infrastructure : wmimgmt.msc
* Windows System Security Tool : syskey
* Windows Update Launches : wupdmgr
* Windows XP Tour Wizard : tourstart
* Wordpad : write

How to Recover from System Crash

When a Blue Screen Occurs, you'd better be prepared for the worst. If you absolutely must have a backup of your documents,
your setup and your software, some settings in Windows can also make a difference if a problem occurs.

We advise you to reap that your computer is working properly to collect the maximum information about your hardware and software.
You will necessarily need to know the configuration of your equipment. Regarding software, if you have lost your serial numbers,
it's time to get to not be blocked if you ever need to reinstall Windows.

You absolutely must also configure your system to facilitate the diagnostic work and repair that you should carry in case of failure seriously.

Study hardware configuration:
Do you know exactly what components and devices are installed in your computer? Certainly not all ... But if you have a problem,
and want to determine its origin, it is essential to know your setup in detail. This information will be very useful, whether on a discussion forum or
the hotline for a hardware manufacturer.
~ Download Sisoft Sandra Lite from here and Install it on your system.
~ When this is done, run it by double-clicking for example on its icon on the desktop.
~ Open the Tools tab.
~ Double click on the Create Report.
~ Double click on the Next button.
~ Uncheck all boxes except Overview of the computer. Click Next.
~ In the section Benchmarks, uncheck all the boxes and click Next.
~ Do the same for headings and Software Support and double click on the Next button.
~ Scroll Distribution and choose Print and Fax.
~ Click the Browse button and click Next.
~ Select your printer and click on the button Print.
~ The report is then printed. Put it somewhere safe.

Get the serial numbers of programs:
If you need to reinstall your system, you will need the serial numbers of your programs. You have their installation CD but can not get their hands on the documentation containing the serial number. Do not worry, you have a second chance thanks to the software Advisor.
This free little program will allow you to find,
on your PC, the serial number of some of your software.
~ First of all you'll need to download Advisor and install it on your system.
~ Once installation is complete, it examines your system. After a few seconds, a web page appears.
~ In the section Software Licensing, serial numbers for software you have installed are displayed. Print the page and put it somewhere safe.

Save the system from getting crashed:
You can ask Windows to record in an event log, time and exact date of crashes occurring on your system. Next computers,
this setting can be enabled or not be.
To activate, you must edit the registry.

~ Click Start, then Run.
~ Enter regedit in the Open text box and click the OK button.
~ Pull the key from HKEY_LOCAL_MACHINE, SYSTEM, CurrentControlSet, Control, CrashControl.
~ Create a new value called LogEvent (unless it already appears in the right frame of the window). Just click on the Edit menu, New, DWORD Value,
and name the value LogEvent.
~ Double-click on the latter, then enter 1 in the text box data value. Click OK.
~ Then close the Registry Editor and restart your computer for the change is applied.

Save the user environment after a crash:
In most crashes, you can also save all information from the user environment: user profile, permissions, etc.. in an event log.
This information can be used to investigate the causes of a problem.
Once again, it is necessary to modify the registry to enable this setting.
~ Click Start, then Run.
~ Enter regedit in the Open text box and click the OK button.
~ Pull the key from HKEY_LOCAL_MACHINE, SYSTEM, CurrentControlSet, Control, CrashControl.
~ Pull down the Edit menu, and click DWORD Value.
~ Name the new value UserEnvDebugLevel.
~ Double-click it to edit it. Select the category Hexadecimal Base.
~ Enter 10002 in the Value data field. Click OK.
~ Finally close the registry editor, then restart your computer for the change to take effect.

Saving the memory in case of crash:
When your system fails, you can create an image of the memory of your system that you can use to find the cause of the error.
You can choose between several types of memory dumps.
Complete memory: The full memory dump records the entire contents of memory before the system shuts down without explanation. Its size is equivalent to the amount of RAM installed on your computer, which you must add 1 Mo. It is therefore worth a lot of disk space to store this image. So if you have 512 MB of RAM, will dump a 512 + MB or 513 MB
Kernel memory: The kernel memory dump records only the memory allocated to the kernel of Windows XP, hardware, operating systems and programs executed by the system. It therefore excludes the memory allocated to software executed by users. The backup process on the hard disk and is accelerated in the event of a crash. The size of the kernel memory dump is approximately one third of the total amount of RAM installed on your computer. This type of image is most interesting, since it is much smaller than the complete memory dump, and it neglects only the memory areas that do not appear to have any relation with the problem.
Memory Dump: Finally, the memory dump records the minimum information necessary to identify the cause of the crash. The memory dump saves in less than 64 KB: the stop message and parameters, the list of drivers loaded, the process context, information on the process stopped, the information on thread that stopped.
The memory dump can be useful if you have limited disk space. But you have less chance of finding the cause of errors in the examination, because of the lack of information retrieved.

To set the type to create memory dump during a crash, you must change the system settings.
~ Click the right mouse button on My Computer, then choose Properties.
~ In the System Properties dialog box that opens, click the Advanced tab.
~ Then click the Settings button under Startup and Recovery.
~ Pull down list then Writing debug information, then select the type of image you want to create in a crash, Kernel memory, for example, and click OK.

Install the Recovery Console:
The Windows Recovery Console is designed to help you recover the system if your computer does not start properly or does not start at all.
The Recovery Console can be executed directly by starting your computer from the Windows XP CD. You can also install it on your computer for easier access.
Insert your Windows XP CD in your drive.
~Then click the Start button, then Run.
~Then enter in the Open text box the following command: E: \ i386 \ winnt32.exe / cmdcons where E: is the drive letter in which your Windows XP CD.
~Confirm the installation of the Recovery Console by clicking the Yes button in the dialog box that appears.
~If you are connected to the Internet, the installer tries to download the Recovery Console from the Microsoft website. Press ESC to install directly from your Windows XP CD.
~After a few seconds, a message appears to indicate that the Recovery Console is installed. Click OK, then restart your computer.
~When you next start the computer, Recovery Console will be added to Windows startup menu.

Improving the functionality of the Recovery Console:
By default, access to all drives and all folders on your hard drive and the diskette are not allowed in the Recovery Console. Only the folder where Windows is available.

To change this and allow you to access all folders on your hard drive and all your readers, which is convenient to perform a backup last minute of your sensitive documents, you need to change local security setting.
~Open the Control Panel by clicking Start, Settings, then Control Panel.
~Switch to Classic View if you're not there already, then double-click the Administrative Tools folder.
~Then double-click on Local Security Policy tool.
~In the Security Settings section, scroll element Local Policies, then click the Security Options folder.
~In the right frame of the window, double-click the policy Recovery Console: Allow floppy copy and access to all drives and folders.
~Click the Enabled option in the dialog box that appears, then confirm with OK. You can then close the Local Security Settings window.

Uses of DD Command

Linux provides a DD command which is the powerful UNIX utility. It makes use of Linux kernel makefiles to make boot images.
DD can be used to copy data from one device to another or from one location to another.
Administrator is the only person having rights to execute DD command. You can use the below DD command in Linux operating
system which will help you in various ways.

The uses of DD command are as follows:
~ If you want to take the backup data from one hard disk to another hard disk within the same system. The command is given below:
Code:
# dd if=/dev/sda of=/dev/sdb
~ In this “if” specifies input file name and “of” specifies the file where the data has to be copied. If you mention source device in target device and vice versa then you might loss all your data.
~ If you want to restore the hard disk with the image file of another hard disk then use the following command:
Code:
# dd if=hdadisk.img of=/dev/hdb
~ To copy the data from the floppy into the image format you need to type the following command:
Code:
# dd if=/dev/fd0 of=myfloppy.img
In the input file specify the name of floppy location and in output give the name of floppy image file.
~Type the below command to read data from one location and write it to another location. The command is given below:
Code:
dd if= of= bs= ("USUALLY" some power of 2, and usually not less than 512 bytes (ie, 512, 1024, 2048, 4096, 8192, 16384, but can be any reasonable whole integer value.) skip= seek= conv=< conversion >
~ If you want to remove CD, DVD or USB from the system then type the below command. This command will rescue it from the system.
Code:
ddrescue -b 2048 -d -e 20 -r 300 -v /dev/hdc /home/sam/dvd.iso log.txt
~ You can backup a partition. For taking the backup you need to specify the partition name in input file and then specify the path or image file where you want to take backup. The dd command for taking backup is given below:
Code:
# dd if=/dev/hda1 of=~/partition1.img
~You can create an iso file from the source file. So we can enter the CD or DVD and create an iso file from the data contained in them. The dd command for creating iso is given below:
Code:
# dd if=/dev/cdrom of=tgsservice.iso bs=2048
Thus dd command reads one block at time, executes it and writes to the targeted output file.

How to Add subtitles to your home made videos

You filmed your vacation and you want to add subtitles to your video to showcase places you have visited for example,
to provide additional information to sound and image, or to translate foreign dialogue.

Movie Maker software, which is built into Windows XP, Windows Vista and you can install in Windows 7 for free ,
you can easily perform the editing of your videos. It also allows you to add subtitles that are embedded directly to your video.
Thus, whatever the medium and the software with which you watch your movie, the subtitles will be displayed and legible.

You can view your subtitles between two clips in the form of a transition or directly involved in a clip.
To define the appearance of the subtitle, you need to use the timeline table. And for a perfect result, you can customize the font,
size and color of subtitles.

Importing a movie:

Open Windows Movie Maker built into Windows XP and Windows Vista. You'll find it in the Start menu.
~ Run Windows Movie Maker by clicking the Start button, click All Programs, then clicking on the shortcut Windows Movie Maker.
~ In the software window that opens, click the Task button to bring up the Task Pane.
~ Inside, drop down the list 1. Capture Video and choose Import Video.
~ Select your hard drive the movie you want to add subtitles and click the Import button.

Split the movie into clips:

Movie Maker cut your movie into smaller clips, which correspond to different sequences of the movie.
You can work more effectively on small pieces of film and arrange them in order of your choice.
~ If a video clip seems too long, click with right mouse button and choose Create clips.
~ Drag the different clips in your movie in a row in the storyboard.
~ The various clips are connected then make up your movie.
~ You can verify that your film is in the right order using the preview box on the right.

Add a subtitle:

You will now have to choose the moments when putting your subtitles.
~ Switch then to the pasteboard time by clicking the button displays the timeline.
~ Start playing your movie, and when you want to add a subtitle, press the Pause button.
~ In the task pane, scroll down the list 2. Edit Video. Click on the Create titles or generics.
~ Then click Add a title selected clip in the timeline.
~ Enter your text in the text box below to display it in the bottom of the video.
If necessary, move the text down by putting two newlines just before.
~ Then click the Modify font and text color.
~ You can then modify the font, size and color of the text. Choose a color quite readable, like yellow.
~ Then click the Add link under the video.
~ Then the operation again whenever you want to add a subtitle.
~ To adjust the appearance of a subtitle with the video, you can manually move the subtitles into the Title Overlay row.

Save Movie:

Here is how you can save your movie with subtitles.
~ After checking with the insight that all your subtitles are well placed, pull down list 3. Complete video of the left pane.
~ Then click Save to my computer.
~ Enter a name for your video and click the Next button.
~ Leave optimum quality and click the Next button. Your film is created.
~ Then click the Finish button.
~ Your film is then opened with Windows Media Player. The subtitles are embedded in the video, you can
burn your movie or send it to friends, everyone will have subtitles.

Cara Menghapus Virus Shortcut dari Flashdisk dengan Command Prompt(CMD)

Ok kita mulai:

1. Buka CMD [Command Prompt] : Klik "Start",pilih "Run" atau "windows logo" + "R", lalu ketik "cmd" dan Ok.
2. Cari tahu dulu dimana letak drive Flashdisk Anda, misal di disk "G:"],
maka pada tampilan box cmd tulislah kode : attrib -h -r -s /s /d g:\*.*
3. Enter
4. Kemudian Cek flashdisk Anda


Done.

Saturday, October 22, 2011

How to Protect your computer from Hackers while Online

o protect you from hackers on the Internet, we recommend the firewall Jetico: this is the best.
And to arrange everything: he is French and free.

After defining your trusted zone, that is to say the LAN between your computer and your Internet connection
before you will allow or not the software you use to connect to the Internet. Usage rules for Web browsers,
messaging software, or FTP clients are preset and enable the software to access the Internet safely.

For other software, you refuse to authorize ad hoc or permanent access to the Internet.
If you are unsure, you can reject the connection, even if the permit later if needed.

Follow the guide to properly deal with Jetico and have optimum protection.

Download and install Jetico:
Jetico is a free firewall. You can download it from here
~ Once the download is complete, click the Run button.
~ Confirm the launch of Setup Jetico by clicking the Run button.
~ The installation wizard opens Jetico. Click the Next button.
~ Check the box I accept this agreement and click Next three times.
~ Jetico files are copied to your computer. Check the Yes box, I now proceed to the configuration.
~ Click the Finish button when done.

Set the network monitoring:
You must now define your area of confidence, that is to say your computer or network on which you have your computer
(your router or your box for example).
~ The Setup Wizard opens Jetico. Click the Next button.
~ Jetico found himself the address of your network: 192.168.1.0. If in doubt, you can check the documentation for
your router or your box.
Click the Next button.
~ Ignore the setting of the sensitive area by clicking Next.
~ Finally click the Finish button.
~ Click OK to restart your computer.

Allow early access:
When you restart your computer, locate the icon Jetico in the taskbar (it is 2 small gray arrows).
This icon indicates that Jetico is operational. At the same time, one or more windows on the screen.
Jetico actually detects programs wishing to connect to the Internet.
Watch the online application to find out what software is.
If the software has the right to connect to the Internet, it may be your antivirus, for example,
select the Custom option (reject) and click Edit Rule.

In the window that appears, scroll down the list and select the option Verdict Accept. Click OK twice.
For software which you do not know whether or not allow access to the Internet, select the Block this activity.
You can change this permission later if needed. Windows and software that start at boot time to finish loading.

Manage Permissions:
Now you must assign the rules of predefined software the most important: your web browser, email software, your FTP client, ...
~ Start your first Web browser.
~ A window Setting the event network Jetico opens. Select Treat.
~ Scroll to the right, select the proposal that corresponds to your software, Web browser here.
~ Click the OK button.
~ Then do the same with your mail client, Outlook, Outlook Express or Thunderbird, for example,
and choose Treat Customer Messaging.

Improved browser protection:
Some predefined rules, like those that manage your Web browser, are content to allow certain types
of communication, without preventing other. To improve your security, you can force the blocking of
communications that are explicitly permitted.
~ Double click on the icon Jetico in the taskbar to bring up the main program interface.
~ Open the Settings tab.
~ Scroll down and click on Optimal protection Web Browser. Note that this option may also
be located in Racine, rules on applications, Ask the user.
~ Click the right mouse button in an empty space right frame of the window and then select the command
New Rules for application.
~ In the window that appears, scroll down the list and select the option Verdict Reject.
~ Click the OK button. The rule is added on top of the list of other rules.
~ Then click on this new rule and, while holding the mouse button down, move there at the end of the list.
~ Finally, click on the Save icon, shaped disk.

Manage Alerts:
As and when you launch the software, check if Jetico need access to the Internet and they must be
accessible from the Internet.
A dialog box Setting the network event opens for you to specify if the software is allowed or not to connect
to the Internet.
~ For specific needs, as for a research update, select the Allow this activity.
The software will then have immediate access to the Internet. Uncheck the box Save my answer.
Your review will then be asked again during the next attempt to connect the software.
~ To deny access to Internet software, select the Block this activity.
~ If the software require a simple access to the LAN (not internet) to play with friends in the network for example,
select Treat and select applications in trusted zone.

How to Select and Copy Text from Restricted Website

Many web pages that don’t allow you to select and copy text.
One of the intention is to prevent anybody from stealing the content and distribute it
for commercial purpose.In fact this is a little trick that is done by using javascript which
prevent you from selecting the text and eventually fail to copy it.
Here we would like to show some simple steps that you can turn
the situation around by able to copy the text without any restriction.

To overcome this restriction, follow below steps:

1) Go to the website which restricts you from selecting and copying.
2) Copy below javascript and paste it at the address bar and hit enter key.

javascript:void(document.onselectstart=null)

3) Now you can select and copy the text from this website using conventional way -
highlight the text followed by "CTRL + C" to copy, then paste it into notepad or word document.

Hope this simple trick will able to help you overcome some situation whereby you need to copy
the content for personal reference and please use this trick wisely.

How to make a PayPal ACC without the need to verify anything

If you are from North America you have to face prompt of Paypal  that ask you for your SSN (Social Security Number). This is very Easy metho...