Thursday, September 24, 2009

Books On Hacking

Code:
17. [ FLASH ] rues on IBM AIX
http://video.antichat.net/file17.html

Code:
18. [ FLASH ] sequential of rues ispravlenym eksploytom
http://video.antichat.net/file18.html

Code:
19. Is utilized short hyphen. We make no invisible.
http://video.antichat.net/file19.html

Code:
20. Vulnerability http://www.chatmoscow.ru
http://video.antichat.net/file20.html

Code:
21. IRC. Mockery above Slader-Non
http://video.antichat.net/file21.html

Code:
22. Vulnerabilities SetccMS (XSS)
http://video.antichat.net/file22.html

Code:
23. Installation Apache, Php, Perl, Mysql to localhost
http://video.antichat.net/file23.html

Code:
24. Php- injection in the script of news CuteNews v1.3.1
http://video.antichat.net/file24.html

Code:
25. Method of the interpretation of khesha IPB 2..x and breaking the forum
http://video.antichat.net/file25.html

Code:
26. Breaking Invision Power Board sploytom
http://video.antichat.net/file26.html

Code:
27. New vulnerability PunBB
http://video.antichat.net/file27.html

Code:
28. cuz uze google’n'yandex before askin ‘ stupid questions %)
http://video.antichat.net/file28.html

Code:
29. WWWThreads Bug
http://video.antichat.net/file29.html

Code:
30. Breaking phpBB 2.0.15 new sploytom
http://video.antichat.net/file30.html

Code:
31. Active XSS in LiveJournal.com
http://video.antichat.net/file31.html

Code:
32. Installation of proxy to unix the machine
http://video.antichat.net/file32.html

Code:
33. XSS in phpBB with use phpNuke
http://video.antichat.net/file33.html

Code:
34. Idea of defeysa of the site through the search demands!
http://video.antichat.net/file34.html

Code:
35. Defeys of the site through the vulnerability in PunBB (php include)
http://video.antichat.net/file35.html

Code:
36. Breaking OF LARGE BROTHER – tntbrat.ru. SQL – injection.
http://video.antichat.net/file36.html

Code:
37. Breaking hack-info.net through PHP injection and GIF the file
http://video.antichat.net/file37.html

Code:
38. Breaking of the mailbox through the holes on the server
http://video.antichat.net/file38.html

Code:
39. SQL- Eng. in IPB 1. *, 2. *. Obtaining khesha of admina
http://video.antichat.net/file39.html

Code:
40. History of the breaking of one site
http://video.antichat.net/file40.html

Code:
41. XSS in MercuryBoard. New.
http://video.antichat.net/file41.html

Code:
42. Vulnerability IkonBoard. Reading it is file
http://video.antichat.net/file42.html

Code:
43. Error of khostera in tuning of system.
http://video.antichat.net/file43.html

Code:
44. Obtaining administrative privelegiy in paBugs
http://video.antichat.net/file44.html

Code:
45. Vulnerability phpBB in module downloads.php
http://video.antichat.net/file45.html

Code:
46. XSS in many search with- swing. It is in detail.
http://video.antichat.net/file46.html

Code:
47. Breaking phpBB new sploytom
http://video.antichat.net/file47.html

Code:
48. XSS in PunBB 1..x
http://video.antichat.net/file48.html

Code:
49. XSS in MercuryBoard 1..x
http://video.antichat.net/file49.html

Code:
50. Vulnerability in SR Guestbook
http://video.antichat.net/file50.html

Code:
51. Breaking of box on e-mail.ru (part of 2)
http://video.antichat.net/file51.html

Code:
62. Vulnerability in phpBB 2.0.12 (KEZ)
http://video.antichat.net/file62.html

Code:
63. Vulnerability in phpBB 2.0.12 (max_.pain89)
http://video.antichat.net/file63.html

Code:
64. We obtain seriynik for progi through ArtMoney
http://video.antichat.net/file64.html

Code:
65. We read strange letters on mail.ru through the sessions
http://video.antichat.net/file65.html

Code:
66. SQL injection in LedForums
http://video.antichat.net/file66.html

Code:
67. Example Post- Flood through DenyoLaunch III
http://video.antichat.net/file67.html

Code:
68. SQL injection in search.php in phpBB 2.0.6
http://video.antichat.net/file68.html

Code:
69. SQL injection in MercuryBoard 1.1.0
http://video.antichat.net/file69.html

Code:
70. Study of protection WinRAR 3..0b =)
http://video.antichat.net/file70.html

Code:
71. Second method of the theft of nikov in the chat room
http://video.antichat.net/file71.html

Code:
72. CHAT ROOM. Seizure of nikov.
http://video.antichat.net/file72.html

Code:
73. Presence s/n for WinZIP 8..0b
http://video.antichat.net/file73.html

Code:
74. We make patch for BlueFace (CodeFusion)
http://video.antichat.net/file74.html

Code:
75. We make patch for WinZIP 8..0b (CodeFusion)
http://video.antichat.net/file75.html

Code:
76. We penetrate in strange comp. through Remote Administrator
http://video.antichat.net/file76.html

Code:
77. Pincha no longer catches the antivirus
http://video.antichat.net/file77.html

Code:
78. Survey of bagov in cgi scripts.
http://video.antichat.net/file78.html

Code:
79. Idea of brutoforsa amperesecond through HTTP demands.
http://video.antichat.net/file79.html

Code:
80. As to drive away as’ku. One of the methods.
http://video.antichat.net/file80.html

Code:
81. By vlom with the aid of rAdmin Of brutforsera!
http://video.antichat.net/file81.html

Code:
82. one additional method to skachat’ paid mp3 c of site mp3search.ru.
http://video.antichat.net/file82.html

Code:
83. Defeys on the rapid. Bagi on the server. Admin did not advance right on the folders.
http://video.antichat.net/file83.html

Code:
84. Vulnerability of site on cursor runcms
http://video.antichat.net/file84.html

Code:
85. Story about troyane pinch 1.0
http://video.antichat.net/file85.html

Code:
86. The new vulnerability Mybb. XSS works in all browsers.
http://video.antichat.net/file86.html

Code:
87. Breaking IcrediBB (SQL-injection)
http://video.antichat.net/file87.html

Code:
88. Baga in the the guest MPM Guesbook Pro
http://video.antichat.net/file88.html

Code:
89. As to rock mp3 for free from site mp3search.ru
http://video.antichat.net/file89.html

Code:
90. Sql-injection on cursor Php-Nuke
http://video.antichat.net/file90.html

Code:
91. SQL-injection in forum Zorum
http://video.antichat.net/file91.html

Code:
92. XSS and SQL-injection MyBB the forum
http://video.antichat.net/file92.html

Code:
93. Seizure Flesch chat room (part of 2)
http://video.antichat.net/file93.html

Code:
94. Seizure Flesch chat room (part 1)
http://video.antichat.net/file94.html

Code:
95. XSS in the forums in sparenykh BB tags VBulletin 3.0. *
http://video.antichat.net/file95.html

Code:
96. As to become adminom of forum ITA V1.49.
http://video.antichat.net/file96.html

Code:
97. Vulnerabilities in Zeroboard.
http://video.antichat.net/file97.html

Code:
98. Video about the the new XSS in the forums in sparenykh BB the tags
http://video.antichat.net/file98.html

Code:
99. UNION in SQL demands. Example of work.
http://video.antichat.net/file99.html

Code:
100. Vozmozhye vulnerabilities in scripts Manlix.
http://video.antichat.net/file100.html

Code:
101. As to become adminom on the site made in Flat-nuke.
http://video.antichat.net/file101.html

Code:
102. Error of adminov with installation Guestbook v1.1. Defeys on the rapid.
http://video.antichat.net/file102.html

Code:
103. Defeys for the small. Defeys on the rapid.
http://video.antichat.net/file103.html

Code:
104. Again PHPBB. if the provider of dull.
http://video.antichat.net/file104.html

Code:
105. XSS vulnerability in forum forum.antichat.ru (vbulletin 3.0.3)
http://video.antichat.net/file105.html

Code:
106. To the article about mail.ru. We steal Cooks in the chat room. More detailed video.
http://video.antichat.net/file106.html

Code:
107. To the article about mail.ru. We steal Cooks in the chat room. We become moderators chat.mail.ru.
http://video.antichat.net/file107.html

Code:
108. php inklyuding KorWeblog
http://video.antichat.net/file108.html

Code:
109. Breaking e-mail’ov 2. Sorting of passwords. Is utilized Brutus (under Windows).
http://video.antichat.net/file109.html

Code:
110. Breaking e-mail’ov. Is utilized THC – Hydra.
http://video.antichat.net/file110.html

Code:
111. Vulnerability Ultimate PHP Board (UPB) v1.9
http://video.antichat.net/file111.html

Code:
112. Forum Russian Board Or as it is not necessary to write authorization system. (found Max_.pain)
http://video.antichat.net/file112.html

Code:
113. As to obtain strange letters on ramblere
http://video.antichat.net/file113.html

Code:
114. LiteForum 2 (SQL-injection)
http://video.antichat.net/file114.html

Code:
115. We look passwords on forum Powered by Web Wiz Forums.
http://video.antichat.net/file115.html

Code:
116. Overcrowding of buffer. Theory.
http://video.antichat.net/file116.html

Code:
117. We steal UIN, having a base of the users
http://video.antichat.net/file117.html

Code:
118. As to steal the Internet on 445 port
http://video.antichat.net/file118.html

Code:
119. Baga ConfYmi 2.1
http://video.antichat.net/file119.html

Code:
120. We obtain root, I use sploita.
http://video.antichat.net/file120.html

Code:
121. Practitioner Flood
http://video.antichat.net/file121.html

Books on Virus Source Codes

DR VBS

This little program allows you to add source code and generate your own worm/virus,it has some samples of code inside the zip too

Download
http: //205.209.98.61/stats/dl/virs/vir-build/DrVBS.zip

VBSwg 2 beta – Virus builder

Builds worm and add spread options like email or mIRC then you choose what to infect on computers,change PC name, go to url option, antideletion, polymorphic and other shit

Download
http: //205.209.98.61/stats/dl/virs/vir-build/vbswg2.zip


p0ke’s WormGen 2.0

Nice easy worm generator that will spread through network shares and emails , it will scan for emails ,it has irc bot and more options

Download
http: //205.209.98.61/stats/dl/virs/vir-build/Pokes-Worm-Gen-2.zip

RESIDUO

A DOS virus builder
Download
http: //205.209.98.61/stats/dl/virs/vir-build/vc.zip

Prevent PenDrive Virus

Prevent PenDrive Virus
:: Do the following ::

1) Disable autorun/autoplay function of your pen drive.

2) Now plugin your pen drive and open any folder of your computer.
(Do not open any folder from ur pen drive.)

3) Now goto tools then select Folder Option
In that box mark the Show Hidden Files & Folders option.
Also Uncheck Hide Extension for known file types & Hide Protected OS files.

Now click apply and ok buttons and close that folder.

4) Nome come to desktop.
On the Desktop, click on windows Start button and select Search for files & folders.

When the search dialog box appears on the screen, in that click on All Files & Folders, now click on More Advanced Options then select search Hidden files & folders.

Now go above & in Look In option, select your pendrive letter (For example E: Or G:)
and hit Enter.

5) Now if you see any unknown .Exefiles, simply delete them all.

Enabling right click on sites that disable it

Enabling right click on sites that disable it
Lots of web sites have disabled the right click function of the mouse button… it’s really, really annoying. This is done so that you don’t steal (via right-click->save picture) their photos or images or any other goodies. Unfortunately, it disables ALL right-click functionality: copy, paste, open in new window.

It’s easy to change, assuming your using IE 6:
Click “Tools”->”Internet Options”
Click the “Security” tab
Click “Custom Level”
Scroll down to the “Scripting” section
Set “Active Scripting” to “disable”
Click “Ok” a couple of times.

You’ll probably want to turn this back to “enable” when your done… ’cause generally the javascript enhances a website.

List of Port Numbers

0=Reserved

1=tcpmux

2=compressnet

3=compressnet

4=Unassigned

5=Remote job Entr

6=Unassigned

7=Echo

8=Unassigned

9=Discard

10=Unassigned

11=Active users

12=Unassigned

13=Daytime

14=Unassigned

15=Unassigned

16=Unassigned

17=Quote of the Day

18=Message Send Protocol

19=Character generator

20=FTP (Data)

21=FTP (Control)

22=Unassigned

23=Telnet

24=Private mail-system

25=SMTP

26=Unassigned

27=NSW User System FE

28=Unassigned

29=MSG ICP

30=Unassigned

31=MSG Authentication

32=Unassigned

33=Display support Protocol

34=Unassigned

35=Private printer server

36=Unassigned

37=Time

38=Route access Protocol

39=Resource location Protocol

40=Unassigned

41=Graphics

42=Host Name Server

43=Who Is

44=MPM FLAGS Protocol

45=Message Processing Module (recv)

46=mpm-snd, MPM (default send)

47=ni-ftp

48=Digital Audit Daemon

49=login, Login Host Protocol

50=re-mail-ck, Remote Mail Checking Protocol

51=IMP Logical Address Maintenance

52=xns-time, XNS Time Protocol

53=domain, Domain Name Server

54=xns-ch, XNS Clearinghouse

55=ISI Graphics Language

56=XNS Authentication

57=Private terminal access

58=XNS Mail

59=Private file service

60=Unassigned

61=NI MAIL

62=ACA Services

63=Unassigned

64=Communications Integrator (CI)

65=TACACS-Database Service

66=Oracle SQL*NET

67=Bootstrap Protocol Server

68=Bootstrap Protocol Client

69=Trivial File Transfer

70=Gophergopher

71=Remote Job Service

72=Remote Job Service

73=Remote Job Service

74=Remote Job Service

75=any private dial out service

76=Distributed External Object Store

77=any private RJE service

78=vettcpvettcp

79=Finger server

80=HTTP

81=HOSTS2 Name Server

82=XFER Utility

83=MIT ML Device

84=Common Trace Facility

85=MIT ML Device

86=Micro Focus Cobol

87=Private terminal link

88=Kerberos

89=SU/MIT Telnet Gateway

90=DNSIX Securit Attribute Token Map

91=MIT Dover Spooler

92=Network Printing Protocol

93=Device Control Protocol

94=Tivoli Object Dispatcher

95=SUPDUPsupdup

96=DIXIE Protocol Specification

97=Swift Remote Vitural File Protocol

98=TAC Newstacnews

99=Metagram Relay

100=newacct [unauthorized use]

101=NIC Host Name Server

102=ISO-TSAP

103=Genesis Point-to-Point Trans Net

104=ACR-NEMA Digital Imag. & Comm. 300

105=Mailbox Name Nameserver

106=3COM-TSMUX3com-tsmux

107=Remote Telnet Service

108=SNA Gateway Access Server

109=Post Office Protocol – Version 2

110=Post Office Protocol – Version 3

111=SUN RPC

112=McIDAS Data Transmission Protocol

113=Authentication Service

114=Audio News Multicast

115=Simple File Transfer Protocol

116=ANSA REX Notify

117=UUCP Path Service

118=SQL Servicessqlserv

119=Network News Transfer Protocol

120=CFDPTKTcfdptkt

121=Encore Expedited Remote Pro.Call

122=SMAKYNETsmakynet

123=Network Time Protocol

124=ANSA REX Trader

125=Locus PC-Interface Net Map Ser

126=Unisys Unitary Login

127=Locus PC-Interface Conn Server

128=GSS X License Verification

129=Password Generator Protocol

130=cisco FNATIVE

131=cisco TNATIVE

132=cisco SYSMAINT

133=Statistics Service

134=INGRES-NET Service

135=Location Service

136=PROFILE Naming System

137=NETBIOS Name Service

138=NETBIOS Datagram Service

139=NETBIOS Session Service

140=EMFIS Data Service

141=EMFIS Control Service

142=Britton-Lee IDM

143=Interim Mail Access Protocol v2

144=NewSnews

145=UAAC Protocoluaac

146=ISO-IP0iso-tp0

147=ISO-IPiso-ip

148=CRONUS-SUPPORT

149=AED 512 Emulation Service

150=SQL-NETsql-net

151=HEMShems

152=Background File Transfer Program

153=SGMPsgmp

154=NETSCnetsc-prod

155=NETSCnetsc-dev

156=SQL Service

157=KNET/VM Command/Message Protocol

158=PCMail Serverpcmail-srv

159=NSS-Routingnss-routing

160=SGMP-TRAPSsgmp-traps

161=SNMP

162=SNMP TRAP

163=CMIP/TCP Manager

164=CMIP/TCP Agent

165=Xeroxxns-courier

166=Sirius Systems

167=NAMPnamp

168=RSVDrsvd

169=Send

170=Network PostScript

170=Network PostScript

171=Network Innovations Multiplex

172=Network Innovations CL/1

173=Xyplexxyplex-mux

174=MAILQ

175=VMNET

176=GENRAD-MUXgenrad-mux

177=X Display Manager Control Protocol

178=NextStep Window Server

179=Border Gateway Protocol

180=Intergraphris

181=Unifyunify

182=Unisys Audit SITP

183=OCBinderocbinder

184=OCServerocserver

185=Remote-KIS

186=KIS Protocolkis

187=Application Communication Interface

188=Plus Five’s MUMPS

189=Queued File Transport

189=Queued File Transport

190=Gateway Access Control Protocol

190=Gateway Access Control Protocol

191=Prospero Directory Service

191=Prospero Directory Service

192=OSU Network Monitoring System

193=srmp, Spider Remote Monitoring Protocol

194=irc, Internet Relay Chat Protocl

195=DNSIX Network Level Module Audit

196=DNSIX Session Mgt Module Audit Redir

197=Directory Location Service

198=Directory Location Service Monitor

199=SMUX

200=IBM System Resource Controller

201=at-rtmp AppleTalk Routing Maintenance

202=at-nbp AppleTalk Name Binding

203=at-3 AppleTalk Unused

204=AppleTalk Echo

205=AppleTalk Unused

206=AppleTalk Zone Information

207=AppleTalk Unused

208=AppleTalk Unused

209=Trivial Authenticated Mail Protocol

210=ANSI Z39.50z39.50

211=Texas Instruments 914C/G Terminal

212=ATEXSSTRanet

213=IPX

214=VM PWSCSvmpwscs

215=Insignia Solutions

216=Access Technology License Server

217=dBASE Unix

218=Netix Message Posting Protocol

219=Unisys ARPsuarps

220=Interactive Mail Access Protocol v3

221=Berkeley rlogind with SPX auth

222=Berkeley rshd with SPX auth

223=Certificate Distribution Center

224=Reserved (224-241)

241=Reserved (224-241)

242=Unassigned#

243=Survey Measurement

244=Unassigned#

245=LINKlink

246=Display Systems Protocol

247-255 Reserved

256-343 Unassigned

344=Prospero Data Access Protocol

345=Perf Analysis Workbench

346=Zebra serverzserv

347=Fatmen Serverfatserv

348=Cabletron Management Protocol

349-370 Unassigned

371=Clearcaseclearcase

372=Unix Listservulistserv

373=Legent Corporation

374=Legent Corporation

375=Hasslehassle

376=Amiga Envoy Network Inquiry Proto

377=NEC Corporation

378=NEC Corporation

379=TIA/EIA/IS-99 modem client

380=TIA/EIA/IS-99 modem server

381=hp performance data collector

382=hp performance data managed node

383=hp performance data alarm manager

384=A Remote Network Server System

385=IBM Application

386=ASA Message Router Object Def.

387=Appletalk Update-Based Routing Pro.

388=Unidata LDM Version 4

389=Lightweight Directory Access Protocol

390=UISuis

391=SynOptics SNMP Relay Port

392=SynOptics Port Broker Port

393=Data Interpretation System

394=EMBL Nucleic Data Transfer

395=NETscout Control Protocol

396=Novell Netware over IP

397=Multi Protocol Trans. Net.

398=Kryptolankryptolan

399=Unassigned#

400=Workstation Solutions

401=Uninterruptible Power Supply

402=Genie Protocol

403=decapdecap

404=ncednced

405=ncldncld

406=Interactive Mail Support Protocol

407=Timbuktutimbuktu

408=Prospero Resource Manager Sys. Man.

409=Prospero Resource Manager Node Man.

410=DECLadebug Remote Debug Protocol

411=Remote MT Protocol

412=Trap Convention Port

413=SMSPsmsp

414=InfoSeekinfoseek

415=BNetbnet

416=Silverplattersilverplatter

417=Onmuxonmux

418=Hyper-Ghyper-g

419=Arielariel1

420=SMPTEsmpte

421=Arielariel2

422=Arielariel3

423=IBM Operations Planning and Control Start

424=IBM Operations Planning and Control Track

425=ICADicad-el

426=smartsdpsmartsdp

427=Server Location

429=OCS_AMU

430=UTMPSDutmpsd

431=UTMPCDutmpcd

432=IASDiasd

433=NNSPnnsp

434=MobileIP-Agent

435=MobilIP-MN

436=DNA-CMLdna-cml

437=comscmcomscm

439=dasp, Thomas Obermair

440=sgcpsgcp

441=decvms-sysmgtdecvms-sysmgt

442=cvc_hostdcvc_hostd

443=https

444=Simple Network Paging Protocol

445=Mcft-DS

446=DDM-RDBddm-rdb

447=DDM-RFMddm-dfm

448=DDM-BYTEddm-byte

449=AS Server Mapper

450=TServertserver

512=exec, Remote process execution

513=login, remote login

514=cmd, exec with auto auth.

514=syslog

515=Printer spooler

516=Unassigned

517=talk

519=unixtime

520=extended file name server

521=Unassigned

522=Unassigned

523=Unassigned

524=Unassigned

526=newdate

530=rpc courier

531=chatconference

532=readnewsnetnews

533=for emergency broadcasts

539=Apertus Technologies Load Determination

540=uucp

541=uucp-rlogin

542=Unassigned

543=klogin

544=kshell

545=Unassigned

546=Unassigned

547=Unassigned

548=Unassigned

549=Unassigned

550=new-who

551=Unassigned

552=Unassigned

553=Unassigned

554=Unassigned

555=dsf

556=remotefs

557-559=rmonitor

560=rmonitord

561=dmonitor

562=chcmd

563=Unassigned

564=plan 9 file service

565=whoami

566-569 Unassigned

570=demonmeter

571=udemonmeter

572-599 Unassigned ipc server

600=Sun IPC server

606=Cray Unified Resource Manager

607=nqs

608=Sender-Initiated/Unsolicited File Transfer

609=npmp-trapnpmp-trap

610=npmp-localnpmp-local

611=npmp-guinpmp-gui

634=ginadginad

666=Doom Id Software

704=errlog copy/server daemon

709=EntrustManager

729=IBM NetView DM/6000 Server/Client

730=IBM NetView DM/6000 send/tcp

731=IBM NetView DM/6000 receive/tcp

741=netGWnetgw

742=Network based Rev. Cont. Sys.

744=Flexible License Manager

747=Fujitsu Device Control

748=Russell Info Sci Calendar Manager

749=kerberos administration

751=pump

752=qrh

754=send

758=nlogin

759=con

760=ns

762=quotad

763=cycleserv

765=webster

767=phonephonebook

769=vid

771=rtip

772=cycleserv2

774=acmaint_dbd

775=acmaint_transd

780=wpgs

786=Concertconcert

800=mdbs_daemon

996=Central Point Software

997=maitrd

999=puprouter

1023=Reserved

1024=Reserved

1025=network blackjack

1030=BBN IAD

1031=BBN IAD

1032=BBN IAD

1067=Installation Bootstrap Proto. Serv.

1068=Installation Bootstrap Proto. Cli.

1080=SOCKS

1083=Anasoft License Manager

1084=Anasoft License Manager

1155=Network File Access

1222=SNI R&D network

12345=Netbus

1243=Subseven

1248=hermes

1346=Alta Analytics License Manager

1347=multi media conferencing

1347=multi media conferencing

1348=multi media conferencing

1349=Registration Network Protocol

1350=Registration Network Protocol

1351=Digital Tool Works (MIT)

1352=/Lotus Notelotusnote

1353=Relief Consulting

1354=RightBrain Software

1355=Intuitive Edge

1356=CuillaMartin Company

1357=Electronic PegBoard

1358=CONNLCLIconnlcli

1359=FTSRVftsrv

1360=MIMERmimer

1361=LinX

1362=TimeFliestimeflies

1363=Network DataMover Requester

1364=Network DataMover Server

1365=Network Software Associates

1366=Novell NetWare Comm Service Platform

1367=DCSdcs 1368=ScreenCastscreencast

1369=GlobalView to Unix Shell

1370=Unix Shell to GlobalView

1371=Fujitsu Config Protocol

1372=Fujitsu Config Protocol

1373=Chromagrafxchromagrafx

1374=EPI Software Systems

1375=Bytexbytex

1376=IBM Person to Person Software

1377=Cichlid License Manager

1378=Elan License Manager

1379=Integrity Solutions

1380=Telesis Network License Manager

1381=Apple Network License Manager

1382=udt_os

1383=GW Hannaway Network License Manager

1384=Objective Solutions License Manager

1385=Atex Publishing License Manager

1386=CheckSum License Manager

1387=Computer Aided Design Software Inc LM

1388=Objective Solutions DataBase Cache

1389=Document Manager

1390=Storage Controller

1391=Storage Access Server

1392=Print Managericlpv-pm

1393=Network Log Server

1394=Network Log Client

1395=PC Workstation Manager software

1396=DVL Active Mail

1397=Audio Active Mail

1398=Video Active Mail

1399=Cadkey License Manager

1400=Cadkey Tablet Daemon

1401=Goldleaf License Manager

1402=Prospero Resource Manager

1403=Prospero Resource Manager

1404=Infinite Graphics License Manager

1405=IBM Remote Execution Starter

1406=NetLabs License Manager

1407=DBSA License Manager

1408=Sophia License Manager

1409=Here License Manager

1410=HiQ License Manager

1411=AudioFileaf

1412=InnoSysinnosys

1413=Innosys-ACLinnosys-acl

1414=IBM MQSeriesibm-mqseries

1415=DBStardbstar

1416=Novell LU6.2novell-lu6.2

1417=Timbuktu Service 1 Port

1417=Timbuktu Service 1 Port

1418=Timbuktu Service 2 Port

1419=Timbuktu Service 3 Port

1420=Timbuktu Service 4 Port

1421=Gandalf License Manager

1422=Autodesk License Manager

1423=Essbase Arbor Software

1424=Hybrid Encryption Protocol

1425=Zion Software License Manager

1426=Satellite-data Acquisition System 1

1427=mloadd monitoring tool

1428=Informatik License Manager

1429=Hypercom NMSnms

1430=Hypercom TPDUtpdu

1431=Reverse Gosip Transport

1432=Blueberry Software License Manager

1433=Mcft-SQL-Server

1434=Mcft-SQL-Monitor

1435=IBM CISCibm-cics

1436=Satellite-data Acquisition System 2

1437=Tabulatabula

1438=Eicon Security Agent/Server

1439=Eicon X25/SNA Gateway

1440=Eicon Service Location Protocol

1441=Cadis License Management

1442=Cadis License Management

1443=Integrated Engineering Software

1444=Marcam License Management

1445=Proxima License Manager

1446=Optical Research Associates License Manager

1447=Applied Parallel Research LM

1448=OpenConnect License Manager

1449=PEportpeport

1450=Tandem Distributed Workbench Facility

1451=IBM Information Management

1452=GTE Government Systems License Man

1453=Genie License Manager

1454=interHDL License Manager

1455=ESL License Manager

1456=DCAdca

1457=Valisys License Manager

1458=Nichols Research Corp.

1459=Proshare Notebook Application

1460=Proshare Notebook Application

1461=IBM Wireless LAN

1462=World License Manager

1463=Nucleusnucleus

1464=MSL License Manager

1465=Pipes Platform

1466=Ocean Software License Manager

1467=CSDMBASEcsdmbase

1468=CSDMcsdm

1469=Active Analysis Limited License Manager

1470=Universal Analytics

1471=csdmbasecsdmbase

1472=csdmcsdm

1473=OpenMathopenmath

1474=Telefindertelefinder

1475=Taligent License Manager

1476=clvm-cfgclvm-cfg

1477=ms-sna-server

1478=ms-sna-base

1479=dberegisterdberegister

1480=PacerForumpacerforum

1481=AIRSairs

1482=Miteksys License Manager

1483=AFS License Manager

1484=Confluent License Manager

1485=LANSourcelansource

1486=nms_topo_serv

1487=LocalInfoSrvr

1488=DocStordocstor

1489=dmdocbrokerdmdocbroker

1490=insitu-confinsitu-conf

1491=anynetgateway

1492=stone-design-1

1493=netmap_lmnetmap_lm

1494=icaica 1495=cvccvc

1496=liberty-lmliberty-lm

1497=rfx-lmrfx-lm

1498=Watcom-SQLwatcom-sql

1499=Federico Heinz Consultora

1500=VLSI License Manager

1501=Satellite-data Acquisition System 3

1502=Shivashivadiscovery

1503=Databeamimtc-mcs

1504=EVB Software Engineering License Manager

1505=Funk Software, Inc.

1524=ingres

1525=oracle

1526=Prospero Directory Service non-priv

1527=Prospero Data Access Prot non-priv

1528=oracletlisrv

1529=oraclecoauthor

1600=issd

1651=proshare conf audio

1652=proshare conf video

1653=proshare conf data

1654=proshare conf request

1655=proshare conf notify

1661=netview-aix-1netview-aix-1
1662=netview-aix-2netview-aix-2

1663=netview-aix-3netview-aix-3

1664=netview-aix-4netview-aix-4

1665=netview-aix-5netview-aix-5

1666=netview-aix-6netview-aix-6

1986=cisco license management

1987=cisco RSRB Priority 1 port

1988=cisco RSRB Priority 2 port

1989=cisco RSRB Priority 3 port

1989=MHSnet systemmshnet

1990=cisco STUN Priority 1 port

1991=cisco STUN Priority 2 port

1992=cisco STUN Priority 3 port

1992=IPsendmsgipsendmsg

1993=cisco SNMP TCP port

1994=cisco serial tunnel port

1995=cisco perf port

1996=cisco Remote SRB port

1997=cisco Gateway Discovery Protocol

1998=cisco X.25 service (XOT)

1999=cisco identification port

2009=whosockami

2010=pipe_server

2011=raid

2012=raid-ac

2013=rad-am

2015=raid-cs

2016=bootserver

2017=terminaldb

2018=rellpack

2019=about

2019=xinupageserver

2020=xinupageserver

2021=xinuexpansion1

2021=down

2022=xinuexpansion2

2023=xinuexpansion3

2023=xinuexpansion4

2024=xinuexpansion4

2025=xribs

2026=scrabble

2027=shadowserver

2028=submitserver

2039=device2

2032=blackboard

2033=glogger

2034=scoremgr

2035=imsldoc

2038=objectmanager

2040=lam

2041=interbase

2042=isis

2043=isis-bcast

2044=primsl

2045=cdfunc

2047=dls

2048=dls-monitor

2065=Data Link Switch Read Port Number

2067=Data Link Switch Write Port Number

2201=Advanced Training System Program

2500=Resource Tracking system server

2501=Resource Tracking system client

2564=HP 3000 NS/VT block mode telnet

2784=world wide web – development

3049=ccmail 3264=ccmail, cc:mail/lotus

3333=dec-notes 3984=MAPPER network node manager

3985=MAPPER TCP/IP server

3986=MAPPER workstation server

3421=Bull Apprise portmapper

3900=Unidata UDT OS

4132=NUTS Daemonnuts_dem

4133=NUTS Bootp Server

4343=UNICALL

4444=KRB524

4672=remote file access server

5002=radio free ethernet

5010=TelepathStarttelelpathstart

5011=TelepathAttack

5050=multimedia conference control tool

5145=rmonitor_secure

5190=aol, America-Online

5300=HA cluster heartbeat

5301=hacl-gs # HA cluster general services

5302=HA cluster configuration

5303=hacl-probe HA cluster probing

5305=hacl-test

6000-6063=x11 X Window System

6111=sub-process HP SoftBench Sub-Process Control

6141/=meta-corp Meta Corporation License Manager

6142=aspentec-lm Aspen Technology License Manager

6143=watershed-lm Watershed License Manager

6144=statsci1-lm StatSci License Manager – 1

6145=statsci2-lm StatSci License Manager – 2

6146=lonewolf-lm Lone Wolf Systems License Manager

6147=montage-lm Montage License Manager

7000=afs3-fileserver file server itself

7001=afs3-callback callbacks to cache managers

7002=afs3-prserver users & groups database

7003=afs3-vlserver volume location database

7004=afs3-kaserver AFS/Kerberos authentication service

7005=afs3-volser volume managment server

7006=afs3-errors error interpretation service

7007=afs3-bos basic overseer process

7008=afs3-update server-to-server updater

7009=afs3-rmtsys remote cache manager service

7010=ups-online onlinet uninterruptable power supplies

7100=X Font Service

7200=FODMS FLIP

8010=Wingate

8181=IMail

9535=man

100 Keyboard shortcuts (Windows)

Microsoft windows keyboard shortcuts. You might know most of these shortcuts, but probably not all of them. If you have more keyboard shortcuts, please let me know :)

* CTRL+C (Copy)
* CTRL+X (Cut)
* CTRL+V (Paste)
* CTRL+Z (Undo)
* DELETE (Delete)
* SHIFT+DELETE (Delete the selected item permanently without placing the item in the Recycle Bin)
* CTRL while dragging an item (Copy the selected item)
* CTRL+SHIFT while dragging an item (Create a shortcut to the selected item)
* F2 key (Rename the selected item)
* CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next word)
* CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous word)
* CTRL+DOWN ARROW (Move the insertion point to the beginning of the next paragraph)
* CTRL+UP ARROW (Move the insertion point to the beginning of the previous paragraph)
* CTRL+SHIFT with any of the arrow keys (Highlight a block of text)
* SHIFT with any of the arrow keys (Select more than one item in a window or on the desktop, or select text in a document)
* CTRL+A (Select all)
* F3 key (Search for a file or a folder)
* ALT+ENTER (View the properties for the selected item)
* ALT+F4 (Close the active item, or quit the active program)
* ALT+ENTER (Display the properties of the selected object)
* ALT+SPACEBAR (Open the shortcut menu for the active window)
* CTRL+F4 (Close the active document in programs that enable you to have multiple documents open simultaneously)
* ALT+TAB (Switch between the open items)
* ALT+ESC (Cycle through items in the order that they had been opened)
* F6 key (Cycle through the screen elements in a window or on the desktop)
* F4 key (Display the Address bar list in My Computer or Windows Explorer)
* SHIFT+F10 (Display the shortcut menu for the selected item)
* ALT+SPACEBAR (Display the System menu for the active window)
* CTRL+ESC (Display the Start menu)
* ALT+Underlined letter in a menu name (Display the corresponding menu)
* Underlined letter in a command name on an open menu (Perform the corresponding command)
* F10 key (Activate the menu bar in the active program)
* RIGHT ARROW (Open the next menu to the right, or open a submenu)
* LEFT ARROW (Open the next menu to the left, or close a submenu)
* F5 key (Update the active window)
* BACKSPACE (View the folder one level up in My Computer or Windows Explorer)
* ESC (Cancel the current task)
* SHIFT when you insert a CD-ROM into the CD-ROM drive (Prevent the CD-ROM from automatically playing)
ialog Box Keyboard Shortcuts

* CTRL+TAB (Move forward through the tabs)
* CTRL+SHIFT+TAB (Move backward through the tabs)
* TAB (Move forward through the options)
* SHIFT+TAB (Move backward through the options)
* ALT+Underlined letter (Perform the corresponding command or select the corresponding option)
* ENTER (Perform the command for the active option or button)
* SPACEBAR (Select or clear the check box if the active option is a check box)
* Arrow keys (Select a button if the active option is a group of option buttons)
* F1 key (Display Help)
* F4 key (Display the items in the active list)
* BACKSPACE (Open a folder one level up if a folder is selected in the Save As or Open dialog box)

Microsoft Natural Keyboard Shortcuts

* Windows Logo (Display or hide the Start menu)
* Windows Logo+BREAK (Display the System Properties dialog box)
* Windows Logo+D (Display the desktop)
* Windows Logo+M (Minimize all of the windows)
* Windows Logo+SHIFT+M (Restore the minimized windows)
* Windows Logo+E (Open My Computer)
* Windows Logo+F (Search for a file or a folder)
* CTRL+Windows Logo+F (Search for computers)
* Windows Logo+F1 (Display Windows Help)
* Windows Logo+ L (Lock the keyboard)
* Windows Logo+R (Open the Run dialog box)
* Windows Logo+U (Open Utility Manager)

Accessibility Keyboard Shortcuts

Accessibility Keyboard Shortcuts

* Right SHIFT for eight seconds (Switch FilterKeys either on or off)
* Left ALT+left SHIFT+PRINT SCREEN (Switch High Contrast either on or off)
* Left ALT+left SHIFT+NUM LOCK (Switch the MouseKeys either on or off)
* SHIFT five times (Switch the StickyKeys either on or off)
* NUM LOCK for five seconds (Switch the ToggleKeys either on or off)
* Windows Logo +U (Open Utility Manager)

Windows Explorer Keyboard Shortcuts

* END (Display the bottom of the active window)
* HOME (Display the top of the active window)
* NUM LOCK+Asterisk sign (*) (Display all of the subfolders that are under the selected folder)
* NUM LOCK+Plus sign (+) (Display the contents of the selected folder)
* NUM LOCK+Minus sign (-) (Collapse the selected folder)
* LEFT ARROW (Collapse the current selection if it is expanded, or select the parent folder)
* RIGHT ARROW (Display the current selection if it is collapsed, or select the first subfolder)

Shortcut Keys for Character Map

* After you double-click a character on the grid of characters, you can move through the grid by using the keyboard shortcuts:
* RIGHT ARROW (Move to the right or to the beginning of the next line)
* LEFT ARROW (Move to the left or to the end of the previous line)
* UP ARROW (Move up one row)
* DOWN ARROW (Move down one row)
* PAGE UP (Move up one screen at a time)
* PAGE DOWN (Move down one screen at a time)
* HOME (Move to the beginning of the line)
* END (Move to the end of the line)
* CTRL+HOME (Move to the first character)
* CTRL+END (Move to the last character)
* SPACEBAR (Switch between Enlarged and Nor mal mode when a character is selected)

Microsoft Management Console (MMC) Main Window Keyboard Shortcuts

* CTRL+O (Open a saved console)
* CTRL+N (Open a new console)
* CTRL+S (Save the open console)
* CTRL+M (Add or remove a console item)
* CTRL+W (Open a new window)
* F5 key (Update the content of all console windows)
* ALT+SPACEBAR (Display the MMC window menu)
* ALT+F4 (Close the console)
* ALT+A (Display the Action menu)
* ALT+V (Display the View menu)
* ALT+F (Display the File menu)
* ALT+O (Display the Favorites menu)

MMC Console Window Keyboard Shortcuts

* CTRL+P (Print the current page or active pane)
* ALT+Minus sign (-) (Display the window menu for the active console window)
* SHIFT+F10 (Display the Action shortcut menu for the selected item)
* F1 key (Open the Help topic, if any, for the selected item)
* F5 key (Update the content of all console windows)
* CTRL+F10 (Maximize the active console window)
* CTRL+F5 (Restore the active console window)
* ALT+ENTER (Display the Properties dialog box, if any, for the selected item)
* F2 key (Rename the selected item)
* CTRL+F4 (Close the active console window. When a console has only one console window, this shortcut closes the console)

Remote Desktop Connection Navigation

* CTRL+ALT+END (Open the m*cro$oft Windows NT Security dialog box)
* ALT+PAGE UP (Switch between programs from left to right)
* ALT+PAGE DOWN (Switch between programs from right to left)
* ALT+INSERT (Cycle through the programs in most recently used order)
* ALT+HOME (Display the Start menu)
* CTRL+ALT+BREAK (Switch the client computer between a window and a full screen)
* ALT+DELETE (Display the Windows menu)
* CTRL+ALT+Minus sign (-) (Place a snapshot of the active window in the client on the Terminal server clipboard and provide the same functionality as pressing PRINT SCREEN on a local computer.)
* CTRL+ALT+Plus sign (+) (Place a snapshot of the entire client window area on the Terminal server clipboard and provide the same functionality as pressing ALT+PRINT SCREEN on a local computer.)

Internet Explorer navigation

* CTRL+B (Open the Organize Favorites dialog box)
* CTRL+E (Open the Search bar)
* CTRL+F (Start the Find utility)
* CTRL+H (Open the History bar)
* CTRL+I (Open the Favorites bar)
* CTRL+L (Open the Open dialog box)
* CTRL+N (Start another instance of the browser with the same Web address)
* CTRL+O (Open the Open dialog box, the same as CTRL+L)
* CTRL+P (Open the Print dialog box)
* CTRL+R (Update the current Web page)
* CTRL+W (Close the current window

Open ORKUT IN BLOCKED PC

hi friends u can open any types of websites from following links if it banned..
enjoy

*www.mathtunnel.com
*www.gravitywars.com
*www.kproxy.com
*www.calculatepie.com
*http://www.anonymizer.com/

Open the above sites and just type in http://www.orkut.com in companies or colleges where its blocked n enjoy

how to create con folder

CON is a reserve world in windows operating system.
that’s why we can not create the folder named as
CON.

But by command prompt we can do this

STEP1: goto command prompt
STEP2: type in prompt e:\> “mkdir \\.\e:\con”
STEP3: verify by typing “dir \\.\e:\con”
STEP4: delete the file or folder “rmdir \\.\e:\con”

ollowing file names in Windows are reserved because they represent devices:
con, con.* -> the console
prn, prn.* -> the default printer, as a character device
aux, aux.* -> the default serial terminal, as a character device
lpt1, lpt2, lpt3, lpt4, lpt5, lpt6, lpt7, lpt8, lpt9 -> the parallel ports, as character devices
lpt1.*, lpt2.*, lpt3.*, lpt4.*, lpt5.*, lpt6.*, lpt7.*, lpt8.*, lpt9.*
com1, com2, com3, com4, com5, com6, com7, com8, com9 -> the serial ports, as character devices
com1.*, com2.*, com3.*, com4.*, com5.*, com6.*, com7.*, com8.*, com9.*
nul, nul.* -> the NUL or “waste bit bucket” or “black hole for bits” or “/dev/null” device

Such files are considered to “exist” in all directories, so if you have a filename like “c:\temp\con”, you’re talking about the CON device, not about a normal disk file called “con”. They’re not listed using the “dir” command, or using APIs.

Use chkdsk To Repair Hard Drive Problems

Using a PC regularly also means maintaining it. Sometimes hard drive problems cause the computer to run slow or hang. In bad cases a hard drive makes cranking noises which do not sound like the normal clicks a they usually make while reading or writing data. There may be messages at boot time that give warnings. This is a common one:

Smart Failure predicted on hard disk.
Warning: Immediately backup all data and replace hard disk. A failure may be imminent. Press F1 to continue.

If you are experiencing any of these problems, it never hurts to run a program called Check Disk which scans for errors and can automatically repair them. Just be patient because this process can take at least 15 to 20 minutes or longer if a lot of damage needs to be fixed. Even without any obvious signs, it still might be a good idea to use this feature just to be on the safe side.

Here are the step-by-step instructions:

  1. Click “Start”
  2. Click “Run…”
  3. Where it says “Open:” type the following: cmd
  4. Click “OK”
  5. You will see a black screen with a blinking cursor. This is the command prompt. Use it to type the
  6. following command: chkdsk /r /f

    Then press “Enter”. If you Have done this correctly, you should see this:

    C:\Documents and Settings\User>chkdsk /r /f
    The type of the file system is NTFS.
    Cannot lock current drive.

    Chkdsk cannot run because the volume is in use by another
    process. Would you like to schedule this volume to be
    checked the next time the system restarts? (Y/N)

  7. Type Y where it says (Y/N) to answer yes to the question. Reboot your computer and your hard drive will be scanned for errors before Windows loads. Be patient as this can take 15 to 20 minutes, even up to 60 minutes if there are a lot of files with bad clusters which need to be replaced.

DISCLAIMER AND VISITOR"S AGREEMENT Disclaimer :

Disclaimer : All the postings of mine in this whole forum is not my own collection. All are downloaded from internet
posted by some one else or copied from some blogs or orkut.

Introduction to dos

1. Introduction


DOS provides the most popular operating environment on IBM PCs and IBM PC-compatible microcomputer systems. This document describes the most useful DOS commands. The word DOS is used for convenience to cover Microsoft MS-DOS, IBM PC-DOS and Novell DOS.

Most of the information in this document is applicable to MS-DOS versions 3.3, 5 and 6, with exceptions noted in the text (there was a version 4, but it was quickly superseded). The main new facilities found in MS-DOS versions 5 and 6 are summarised in Sections 8 and 9. If you are not sure which version of DOS you are running, type



VER

at the DOS prompt.


2. The DOS File System

In order to understand how files are referred to on a PC, you need to know the meaning of the following terms:

File Name
This is a name you choose to give to a file.
File Name Extension
This is added on to the end of a file to indicate what sort of information the file contains, e.g. TXT for text or DAT for data.
Disk Drive Letter
This identifies the physical location of the file, e.g. C: for a hard or fixed disk inside the PC, or A: for a 3.5″ disk that you can remove (often called a floppy disk or diskette).
Directory
A name for a related set of files stored together. You can use directories to organise the files stored on your disk.

These are described in more detail below.


2.1. File Names and Extensions

A file is identified by a filename, optionally followed by a dot and a filename extension, e.g.

EXEC.BAT

THESIS.DOC

MYPROG3.FOR

The filename may contain up to eight characters, and the extension may contain up to three characters. Filenames and extensions may contain any of the following letters and symbols:

A-Z  a-z  0-9  !  #  $  %  ^  &  (  )  _  -  {  }  @  ~  #

However, it is common practice to use only letters and numbers for most purposes. It is possible to create files that have no filename extension, but you are recommended to always include one that is appropriate to the content of the file. Some programs expect files to have a particular file extension. For example, files stored by the Microsoft Word word-processing program normally have file extension DOC. Some common filename extensions are listed below:

.BAK
Previous generation of a file saved by an editor or word processor
.BAS
Basic source program
.BAT
Batch file containing a sequence of commands
.BMP
Bitmap image file
.COM
External command file
.DBF
Database file
.DLL
Dynamic link library
.DOC
Microsoft Word word processor document file
.DOT
Microsoft Word word processor document template
.EXE
Executable program file
.FOR
Fortran source program
.HLP
Help file
.INI
Program initialisation file
.LST
Listing file from a compiler
.PAS
Pascal source program
.SYS
System driver file
.WKS
Lotus 1-2-3 spreadsheet file
.TMP
Temporary file
.TXT
Plain text file
.XLS
Microsoft Excel spreadsheet file
.ZIP
Compressed file


2.2. Disk Drive Letters

Disk drive letters are usually followed by a colon (:). A single diskette drive has drive letter A: and a hard disk has drive letter C:. If the PC has a second diskette drive then this is B:. Diskettes are often referred to as floppy disks. If a PC is connected to a network, then the network directories will be identified by one or more other drive letters such as F:, N: or Q:.

When using a command, you may need to type a drive letter before the filename to tell DOS where to find the disk that contains a file. If the drive letter is omitted when you type a filename, DOS automatically searches for the file on the disk in the default drive, i.e. the disk currently being used.

To let you know that it is ready to receive a command, DOS displays a prompt that starts with the current drive letter and ends with a greater-than sign (>). To switch to another drive, type the new drive letter followed by a colon. For example, if the original DOS prompt is

C:>

then type



A:

to specify that you want to work from the floppy disk. This will produce a new prompt:

A:>

This indicates that the A: drive is now the default drive. DOS will search this drive first to find any filenames that you type, unless you specify another drive. The DOS prompt usually includes the current directory, and if it does not it can be modified to do so, e.g.

C:JULY>

where JULY is the directory name. The command to set this prompt is:



PROMPT=$P$G

If there is no current directory then a backslash is shown before the > sign.


2.3. Directories

Each disk contains a file directory, which is a table of contents for the disk. It contains the names of the files stored on the disk, their sizes, and the date they were last modified. As the number of files in a directory grows, it is usual to organise the files into categories. You can use directories to group associated files together. A directory can contain files and other directories (referred to as subdirectories), which in turn may contain further subdirectories. Keeping related files in directories makes it easier to locate a particular file.

When a disk is formatted by DOS (see Section 6) a root directory or first-level directory is created. There is a limit to the number of entries in the root directory of a disk, but subdirectories may contain any number of entries, limited only by the amount of available space on the disk. The root directory is represented by a backslash ().

Each disk drive has a current directory. DOS will remember which directory is current on each of your drives, even when you are not accessing them.

A parent directory is any directory that contains subdirectories. The parent directory entry and the current directory entry are automatically created by DOS whenever a directory is created. DOS uses the shorthand names ‘.’ to indicate the current directory, and ‘..’ to represent the parent directory (i.e. one level up). Some examples of specifying directories are shown below:


represents the root directory.
PROJA
refers to a directory called PROJA under the root directory.
PROJAJIM
refers to subdirectory JIM in parent directory PROJA.
.
refers to the current directory.
..
refers to the parent directory. This might or might not be the root directory.


2.4. Identifying Files

In order to refer to a particular file on a disk, at least a filename must be given. Depending on the circumstances it may also be necessary to give a disk drive letter, a directory name and a filename extension. For example, a file called LETTER.DOC in a directory called JULY on disk C: may be identified in any of the following ways:

LETTER
filename only
LETTER.DOC
filename and file extension
JULYLETTER.DOC
directory name, filename and filename extension
C:JULYLETTER.DOC
disk drive letter, directory name, filename and extension

Note that it is possible to have subdirectories within directories, in which case two or more directory names may have to be given in order to uniquely identify a file.


2.5. Global Filename Characters

You can use the following global filename characters in some DOS commands (COPY, DEL, REN and DIR) to refer to a group of files by a general name, rather than specifying each file individually:

?
stands for any single character
*
stands for any sequence of characters

These are often known as wild-card characters. They may be used in the filename or the filename extension or both. For example:

A:*.DOC
refers to all files with extension DOC in the current directory of drive A:
C:TEST.*
refers to all files with filename TEST in the root directory of drive C:
C:*.*
refers to all files in the current directory of drive C:
THES?.*
refers to any files in the current directory of the default drive that have a filename of four or five characters beginningTHES

You should take great care when using wild-card characters and any filename extension with DEL or REN, as several files can easily be deleted or renamed with a single command.


2.6. Paths and Pathnames

When DOS is required to locate a program or batch file, and a directory is not specified, DOS searches only the current directory of the default drive. To refer to a file in a directory other than the current directory, DOS must be given the name of the directory and the filename, i.e. DOS is given the pathname to the file. A pathname is a sequence of directory names followed by a filename. Each directory name in a pathname is separated from the previous one by a backslash (). The sequence of directory names is referred to as the path. A pathname may contain any number of directory names up to a total length of 63 characters. If a pathname begins with a backslash, DOS searches for the file beginning at the root directory. For example, the pathname

EXAMPLESWORD5MEMO.DOC

refers to the file MEMO.DOC in the subdirectory WORD5 which is in the directory EXAMPLES.

The PATH command is used to set a command search path, i.e. to tell DOS which directories to search after searching the current directory. For example, the command



PATH C:USERPETE

tells DOS to search the subdirectory PETE in the directory USER on the C: drive for any commands (that are not internal DOS commands) which it can not find in the current directory. This path will remain active until you switch the machine off or set another path. Note that it is possible to give several directories in a single PATH command, by including a semicolon between pathnames, e.g.



PATH C:DOS;D:WINDOWS;C:MYPROG

The paths will be searched in the order given in the PATH command. It is advisable to always include the drive letter in a path.

It is possible to set a prompt and a search path every time a system is used, by including a PATH command in a file called C:AUTOEXEC.BAT. Any commands included in AUTOEXEC.BAT will be carried out each time the PC is switched on. For more details of the use of paths and AUTOEXEC.BAT, see User Note 510, Getting the Best from Your PC.


3. Entering DOS Commands

DOS commands may be typed in upper-case or lower-case letters (or a combination) in response to the DOS prompt. To submit a command, type it and press the Enter key. For example, to enter the command DIR, type



DIR

and press Enter. There are two types of DOS command: internal commands and external commands.


3.1. Internal Commands

The most commonly used DOS commands are internal commands, e.g. DIR, COPY, DEL, REN, CD, MD, RD and TYPE. These commands are loaded into memory when a PC is switched on and are carried out immediately they are typed.


3.2. External Commands

Any filename with an extension of COM, EXE or BAT is considered an external command. For example, files such as FORMAT.EXE and DISKCOPY.EXE are external commands. Before DOS can run an external command, it must read the command into memory from disk. When you give an external command, DOS immediately checks your current directory to find that command. If it is not found, you must tell DOS which directory the external command is in by typing the pathname before the command, e.g.



C:DOSFORMAT A:

where the FORMAT command is in the directory DOS on drive C:.


3.3. Repeating Commands

If you make a mistake when typing a DOS command you will get an error message such as:

Bad command or file name

You can then simply retype the command correctly, but for long commands this can be irritating. An easier method is to press the right arrow key or F1 key. Each time you do this a letter of the previous command will be displayed. When you get to the incorrect letter you can simply type the correct letter instead of pressing the right arrow key. You can also use the Insert and Delete key to make changes to the command. When the correct command is displayed, press Enter as usual to submit it.

In DOS 5 and later versions there is a command called DOSKEY that allows you to see and repeat several earlier commands by pressing the up arrow and down arrow keys. DOSKEY may already be available on your system. If not, you can type the command DOSKEY to make it available, then press up arrow to recall commands.


4. Handling Files

This section gives examples of some commonly used DOS commands for controlling files. Most commands have a number of possible parameters. Details of the full format of commands are given by the HELP command (in DOS 5 and later versions).


4.1. Displaying a List of Files

The DIR command is used to list all the files in a directory or a specified group of files. You can use the wild-card characters ? and * in the filename and extension with the DIR command. If either the filename or filename extension are omitted, the default is *. The /P parameter is very useful as it makes the directory display stop scrolling when the screen is full. For example:



DIR

displays all the directory entries for the current directory of the default drive.



DIR C:

displays all the directory entries for the current directory on drive C:.



DIR /P

lists all the directory entries in the current directory on the default drive, one screenful at a time. Press any key to resume scrolling the display, or Ctrl and C to interrupt it.



DIR A:FILE1.* /S

lists the directory entries for all files named FILE1 in the current directory and its subdirectories on drive A: (regardless of their filename extension).

The information provided in the directory listing includes the disk identification and the amount of free space left on the disk. The display line for each file includes its size in bytes (characters) and the date and time that the file was last updated. Entries that name other directories are clearly identified by instead of the size of the file. You can display a large number of directory entries on the screen at one time by using the /W parameter, e.g.



DIR /W

In this case the file names and extensions are listed across the screen, but the file size and date are not included, and directories are shown in square brackets.


4.2. Displaying the Contents of a File

The TYPE command may be used to display the contents of a file on the screen. Wild-card characters are not allowed in the filename or extension. To stop the display disappearing off the screen, press the Ctrl and S keys together or use MORE as shown below. For example:



TYPE D:MYFILE.BAT

displays the file MYFILE.BAT, which is held in the current directory on drive D:.



TYPE SUBDPROG.FOR

displays the file PROG.FOR, which is held in the directory SUBD on the default drive.



TYPE HOLIDAY.DAT | MORE

displays the file HOLIDAY.DAT in the current directory one screenful at a time. To see the next screenful, press any key. To interrupt the display, press Ctrl and C.

The MORE command may be used as an alternative to TYPE with MORE, e.g.



MORE

Note that MORE is an external DOS command and so the MORE command or pipe will only work if the file MORE.COM is in a directory on the current path.

Only text files are displayed by TYPE or MORE in a legible format. Other files, such as word processor files or program files, appear unreadable due to the presence of non-alphabetic and non-numeric characters.


4.3. Renaming Files

The REN or RENAME command is used to change the name of a file. The name of the first file specified is changed to the second one. A path can be specified only with the first file name; the file will remain in the same directory after its name has been changed. The wild-card characters ? and * may be used with this command. For example:



RENAME A:LETTER.TXT MEMO.TXT

changes the name of the file LETTER.TXT on drive A: to MEMO.TXT.



REN *.TXT *.DOC

changes the filename extension of all files with an extension of TXT in the current directory from TXT to DOC.


4.4. Deleting Files

The DEL or ERASE command is used to delete a file or group of files from a disk. You should take great care when using the wild-card characters ? and * with this command, as several files can easily be erased with a single command. For example:



DEL *.TXT

deletes all files with filename extension TXT in the current directory.



DEL A:FILE1.DAT

deletes the file FILE1.DAT from the disk in drive A:.



ERASE C:LEVEL1

deletes all files from the directory LEVEL1 on drive C:.



ERASE *.*

deletes all files in the current directory. The following message is displayed as a precaution:

Are you sure (Y/N)?

Type Y if you really do want to erase all the files.



DEL FILE1 /P

prompts before it deletes the file. This parameter was not available in DOS version 3.3.


4.5. Copying Files

DOS provides three main commands for copying files:

COPY
is used to copy one or more files to a specified disk or directory. This is described below.
XCOPY
is used to copy complete directories, including any subdirectories. This is described in Section 5.5.
DISKCOPY
is used to copy entire disks. This is described in Section 7.

The COPY command is used to copy a file or group of files from one disk to another or from one directory to another. The wild-card characters ? and * may be used with this command. The file to be copied (the source file) is named first. If the second parameter is a directory, files are copied into that directory without changing their names. For example:



COPY ACCOUNTS.WKS C:OCTACC.WKS

copies the file ACCOUNTS.WKS from the current drive and directory to the file ACC.WKS in the directory OCT on drive C:.



COPY B:MYPROG.FOR A:

copies the file MYPROG.FOR from drive B to drive A: with no change in the filename or extension.



COPY A:*.* C:

copies all files in the current directory on drive A: to drive C, with no change in the filename or extension. The names of the files will be displayed as they are copied.


4.6. Moving Files

In MS-DOS version 6 the MOVE command was introduced, to allow you to move files from one directory to another, instead of having to copy and delete them. Its usage is very similar to COPY. For example,



MOVE *.DOC C:DOCS

would move all DOC files from the current directory to the DOCS directory on drive C:. In earlier versions of DOS, files can be moved by using COPY to copy a file, then DEL remove the original one.


4.7. Printing Files

There are a number of ways of printing information on paper if you have a printer connected to a PC:

  • Use the PRINT command (not recommended).
  • Use a DOS command such as COPY, TYPE or DIR with the output directed to a printer, as described below.
  • Press the Print Screen key to print the current screen display.
  • Use the printing option of an application program such as a word processor or spreadsheet.

The PRINT command is not recommended as it is actually a ‘terminate-and-stay-resident’ program (TSR), which means that there is less memory available in a machine after using it. PRINT can also cause problems when using a PC connected to a network, and so should generally be avoided from networked PCs.

DOS uses the keywords PRN, LPT1, LPT2 and LPT3 to refer to a printer connected to the PC. If there is only one printer this may be referred to as either PRN or LPT1. If there are two printers available they are usually referred to as LPT1 and LPT2. These keywords may be used as parameters to DOS commands to direct output to a specified printer. For example:



COPY A:READY.TXT LPT1

prints the contents of the file READY.TXT from the disk in drive A:.



DIR PRICES >PRN

prints a list of all entries in the directory PRICES.



TYPE C:AUTOEXEC.BAT >LPT2

prints the contents of the file AUTOEXEC.BAT on the printer connected to the second parallel port.


4.8. Creating and Changing Files

There are several ways in which files may be created under DOS, for example:

  • By copying the contents of an existing file to a new one.
  • By using an editor such as DOS EDIT (DOS 5 or later) or EDLIN (earlier versions).
  • By transferring a file from another computer system.
  • By running a program which generates an output file.
  • By entering information into an application program such as a word processor, spreadsheet or database program, and saving a file from within the program.

The procedure for copying files is described in Section 4.5.

If you use a word processor such as Microsoft Word to create and amend files, you should be aware that the files created will be stored in a format specific to that program. This presents no problems for files containing text, but it is not normally appropriate for files containing data, commands or programs. For creating or amending these types of files there are two main options:

  • Use a word processor such as Word, but make sure that the file contents are arranged as required and that the file is saved in a ‘text-only-with-line-breaks’ format rather than in the program’s usual internal format.
  • If you have DOS version 5 or later, you can use the EDIT command to run the full-screen text editor. This command includes on-line help. For example, to create or change a file called EXPT.DAT, type:


    EDIT EXPT.DAT

    You can then type or amend the contents as you would expect, using the cursor and backspace keys to move around the file. To quit the editor, press Alt and F then X. You will be prompted whether or not you wish to save the file.

If you have an earlier version of DOS, the EDIT command is not available. There is a line editor called EDLIN but this is awkward to use. There are other alternatives, such as MicroEMACS or PC-Write, which are not part of DOS but are freely available and run under DOS 3. Contact Computing Service Advisory for details.


5. Handling Directories

The use of directories for storing files makes it easy to organise large quantities of information in a meaningful way. DOS always looks in the current directory to find any files whose names are entered without specifying a path.


5.1. Moving Between Directories

The CD command (short for CHDIR) is used to change the current directory. For example:



CD

changes the current directory of the default drive to its root directory.



CD ..

changes the current directory from a subdirectory to its parent directory.



CD TUFNELL

changes to the subdirectory TUFNELL within current directory.



CD C:LEVEL1LEVEL2

changes the current directory of drive C:to the path LEVEL1LEVEL2. The backslash () tells DOS to start at the root directory.



CD

displays the current directory path of the default drive.


5.2. Displaying the Contents and Structure of Directories

To display the contents of a directory, use the DIR command as described in Section 4.1. For example, to display the files in the directory EXAMPLES, you could first type



CD EXAMPLES

to change to the EXAMPLES directory, then type



DIR

to display the list of files in that directory. Alternatively, you could display all the files in EXAMPLES from within the root directory, one screenful at a time, by typing:



DIR EXAMPLES /P

Once you have a significant number of directories and subdirectories, it is easy to forget where a file is located. In this case you can use DIR with the /S option as well, e.g.



DIR /S /P

would display all files in all subdirectories of the current directory. Note that the /S option is not available in DOS version 3.

It is possible to change the default operation of the DIR command by setting a variable in your AUTOEXEC.BAT file. For example, if you added the line

SET DIRCMD=/O:-D-G/P

to AUTOEXEC.BAT, then whenever you just typed DIR files would be listed in date order one screen at a time, with the most recently created or changed file shown first.


5.3. Making Directories

The MD command (short for MKDIR) is used to create a directory or subdirectory on a specified disk. DOS automatically makes the ‘.’ and ‘..’ entries in a new directory, representing the current directory and the parent directory respectively. Directory names may contain up to eight characters, including any of the same symbols as filenames (see Section 2.1). For example:



MKDIR REPORTS

creates the subdirectory REPORTS under the root directory of the current drive.



MD LEVEL42

creates the subdirectory LEVEL42 within the current directory or subdirectory. The absence of a leading backslash causes DOS to begin at the current directory.

Note that directory names can include extensions. For example,



MD N:WIN4WG-3.11

creates the directory WIN4WG-3.11 on drive N.


5.4. Removing Directories

The RD command (short for RMDIR) is used to remove a directory from a disk. A directory can be removed only if it is empty, i.e. if the special entries ‘.’ and ‘..’ are the only two entries displayed when the DIR command is issued. The root directory and the current directory cannot be removed. For example:



RMDIR BRAIN

removes the directory BRAIN from the current directory.



RD C:SEP94DATA

removes the subdirectory DATA from the directory SEP94 on the C: disk.

If you have DOS version 6.0 or later, a new command, DELTREE, allows deletion of a directory and all of its files and subdirectories. Note, however, that this command could potentially delete most of the files on the disk, so it should be used with great care.


5.5. Copying Directories

The XCOPY command may be used to copy files and directories, including the contents of any subdirectories that exist. There are a number of optional parameters to the command, but the most useful ones are /S and /P. For example:



XCOPY A: B: /S

copies all the files and subdirectories on the disk in drive A: to the disk in drive B.



XCOPY C: A: /S /P

copies files and subdirectories from the current directory on drive C:to the disk in drive A, but prompts with (Y/N)? before each file, allowing you to confirm whether you want the file to be copied.


6. Formatting Disks

The FORMAT command is used to prepare a disk for use. FORMAT initialises the disk in the designated drive, analyses the entire disk for any defective tracks, and prepares the disk to accept DOS files by initialising the directory. When a disk is new, it must be formatted before you can use it. If you format a disk that contains information, the information is destroyed. Because of this you should be very careful before you decide to format any disk.

Most models of PC have disk drives that use high-density 3.5″ disks, which can store 1.44 Mb. Some new models have disk drives that handle disks which can store 2.88 Mb. Older models of PC have disk drives that use 5.25″ disks storing either 360 Kb or 1.2 Mb, or standard-density 3.5″ disks which can store 720 Kb of information. Some models have two or three different types of disk drive. A disk drive will try to format a disk to its maximum design capacity unless told otherwise. For example, if you type



FORMAT A:

to format a 3.5″ disk, DOS will attempt to format the disk for either 720 Kb or 1.44 Mb, depending on whether drive A: is a standard-capacity (720 Kb) or high-capacity drive (1.44 Mb). This can cause a problem if you want to format a standard-density disk in a high-capacity drive (e.g. in order to transfer information to a PC that is only equipped with standard-capacity disk drives). If you are sure that you want to format a standard-density disk in a high-capacity drive, use one of the following commands, depending on the size of disk:

For a 3.5″ disk, use the command:



FORMAT A: /N:9 /T:80

This command limits the number of sectors and tracks on the disk to values suitable for a standard-density 720 Kb disk. A standard-density disk formatted to 720Kb in a high-capacity disk drive should be perfectly reliable.

For a 5.25″ disk, use the command:



FORMAT A: /4

This may work but is not guaranteed; the IBM DOS manual states ‘this parameter is intended to allow use of double-sided diskettes in high capacity drives. However, the diskettes formatted with the /4 parameter specified may not be read reliably or written in a double-sided drive’.

You should ensure that you do not under any circumstances attempt to format a standard-density disk as high-density, or vice versa. If you do this you will risk losing all the data subsequently written to the disk, and will encounter problems when trying to use the disk on different machines.

When a FORMAT command is issued, the system displays the message:

Insert new diskette for drive A:

and strike ENTER when ready

The formatting process takes several seconds. When it is complete, you will get a message showing the number of bytes of space available on the disk followed by the question Format another (Y/N)?. Type N to end the FORMAT command or Y to format another disk.


7. Copying and Backing Up Disks

When you use a PC, you will normally be responsible for keeping a secure copy of all your own files on your own fixed disk or diskettes or both. Disks are susceptible to errors and damage, so any important files should be stored in duplicate (at least) with the copies on another disk. Please remember that the secure storage of your files is your own responsibility. In many cases files can not be recovered from corrupt disks, and files which have been accidentally deleted cannot necessarily be recovered.

Each time you make major changes to a file you should copy the file from the disk you are working with to another disk, so that you always have at least one back-up copy available. You may copy individual files with the COPY command or copy whole directories and subdirectories with the XCOPY command, as described in Sections 4.5 and 5.5. In addition, the DISKCOPY and BACKUP commands are particularly useful for copying complete disks. These are described below.

DISKCOPY may be used to copy the contents of one disk (the source) to another (the target), provided that the two disks have the same format. If necessary the target disk is formatted during the copy. For example, the command



DISKCOPY A: B:

will copy the entire contents of the disk in drive A: to the disk in drive B.

If you specify the same drive, a one-drive copy operation will be performed and you will be prompted to insert different disks at the appropriate times. In this case remember that ‘SOURCE’ means the original disk, and ‘TARGET’ means the copy you are creating. Before beginning the operation, you should always make sure that the source disk is write-protected (which means that you can not store any new information on it), and so if you do make a mistake and insert the wrong diskette you will get a warning message but will not lose any information. (To write-protect a 3.5″ disk, slide the black tab in the corner so that so you can see through a hole in the disk; to write-protect a 5.25″ disk, cover the notch near the corner with a small sticky label.)

The procedure for one-drive copying is summarised below:

  1. Obtain the DOS prompt, showing that DOS is ready for a command, and type:


    DISKCOPY A: A:

    The system displays the message:

    Insert SOURCE diskette in drive A:

    Press any key when ready

  2. Make sure the disk to be copied (the source) is write-protected, then insert it in drive A: and press Enter to start the disk copying process. The contents of the disk are read into memory, and the system then displays the message:
    Insert TARGET diskette in drive A:

    Press any key when ready

  3. Remove the source disk from drive A, insert the disk that will become the copy (the target), and press any key to continue. Depending on the amount of memory available in the computer, you may have to switch the disks in this way several times.
  4. Keep switching disks when prompted until the system displays the message:
    Copy another diskette (Y/N)?

  5. Type N to end the DISKCOPY command, remove the copy from drive A, label it and store the original disk in a safe place.

In DOS 3 and 5, the BACKUP command may be used to make a complete security copy of a fixed disk to a series of diskettes. For example, the command



BACKUP C: A: /S

will copy all files in all directories and subdirectories from the C:disk to the diskettes in drive A:. You should have plenty of formatted diskettes before using this command, as in some versions of DOS the BACKUP command does not allow you to format diskettes. In MS-DOS version 6, the equivalent command is MSBACKUP.


8. MS-DOS Version 5

New features in MS-DOS version 5 include:

  • Online help for all commands, accessed by typing HELP followed by the command name, e.g. HELP DIR. The Help screen can be operated via keyboard or mouse (if a mouse is available). To close a help screen, press Alt F X or, if a mouse is available, select File then Exit. Useful examples are given for all commands, and the information can be printed.
  • MS-DOS Editor, providing a full-screen text editor, which is much easier to use than the EDLIN line editor. It is accessed by typing the command EDIT, and includes online help.
  • Two new commands, UNFORMAT and UNDELETE, allow you to restore a newly formatted disk to its original state, and to recover a deleted file.
  • The DIR command has been improved by the addition of parameters to allow sorting and display of subdirectories. Details are provided by typing HELP DIR.
  • A new program called DOSKEY has been added, which allows you to access commands typed in earlier. To activate this program, type DOSKEY. You can then use the up and down arrow keys to access previously typed commands. Type HELP DOSKEY for details of further facilities offered by this command.
  • MS-DOS Shell, which is a colour graphical representation of all files and directories on the disk, designed to simplify tasks such as moving between directories and performing commands. Despite this, it has not proved particularly popular. It does have an additional useful command, SEARCH, which allows a search over the entire disk for a particular file. It is accessed by typing the command DOSSHELL, and has full online help available.


9. MS-DOS Version 6

New features in MS-DOS version 6 include:

  • A particularly useful new command, MOVE, has been introduced. This has a similar syntax to the COPY command described in Section 4.5, but deletes the source file from the disk and moves it to the new location. It can also be used to rename directories. For more information, type HELP MOVE.
  • A new DELTREE command, which allows you to delete a directory and all of its files and subdirectories. Used carefully, this is a time-saving way of deleting a large number of files and directories. Consequently, however, a mistake in the execution of the command could have drastic results, so it should be used with due regard for the consequences which could ensue.
  • The ability to have more than one configuration in your CONFIG.SYS file. This may be useful if you share your computer with other users or wish to test a new system setup. See the manual or type HELP MULTI-CONFIG for details of this new facility.
  • Microsoft DoubleSpace, which increases the available disk space by compressing files. Note, however, that there has been some dispute about the reliability and legality of using this program, particularly since corrupted files can result, and it is therefore recommended that you free space by ensuring that you delete any files you do not need rather than by using DoubleSpace. MS-DOS version 6.2 is reported to overcome these problems, while MS-DOS 6.22 replaces it entirely with a different facility called DriveSpace.
  • Microsoft Anti-Virus, which identifies over 1000 known viruses. However, note that the Computing Service recommends using Dr Solomon’s Anti-Virus Toolkit, for which the University has access to the latest version of the software. It is necessary to register and pay for updates of Microsoft Anti-Virus; details are given in the MS-DOS 6 User Guide.
  • Improved memory optimisation, disk reorganisation and performance tuning. Full details are provided in the manual, but technical assistance may be required to implement the necessary commands. Contact Computing Service Advisory if you have any doubts about the performance of your system.
  • A new program called INTERLNK which is useful if you regularly need to swap files with another computer, for example a laptop system. INTERLNK allows you to transfer files from one computer to another without the need for floppy disks. Note that you do require a special cable, and that changes need to be made to your CONFIG.SYS file. The manual gives full details, but contact Computing Service Advisory for assistance if in doubt.