<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-3812921815264375231</id><updated>2024-11-01T04:13:35.232-07:00</updated><category term="BOOT"/><category term="Xbox"/><category term="bootable"/><category term="cdrwin"/><category term="discimage"/><category term="download"/><category term="gamecube"/><category term="microsoft"/><category term="recording"/><category term="service pack"/><category term="slipstreaming"/><category term="xp"/><title type='text'>Cyber Tutorials</title><subtitle type='html'>Because we love computers</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://cyberztutorial.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3812921815264375231/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://cyberztutorial.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/3812921815264375231/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>THIEF</name><uri>http://www.blogger.com/profile/02562742835916644821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhW2nZSZ302EnOUf8zLgi7E2LmJa6LNLiwsnknKUF8ty4CI22DVk3BMp9_vL7ZZ_WkL12NChQuBhZx7RLaFhc6R1M1QJb7p3PEV4vKJ_iBg-PR_EXxe-06qXeTdv4rr6Q/s220/Image016.jpg'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>104</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-3812921815264375231.post-2270802951643947935</id><published>2009-03-23T02:56:00.000-07:00</published><updated>2009-03-23T02:57:39.259-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cdrwin"/><category scheme="http://www.blogger.com/atom/ns#" term="discimage"/><category scheme="http://www.blogger.com/atom/ns#" term="gamecube"/><category scheme="http://www.blogger.com/atom/ns#" term="recording"/><category scheme="http://www.blogger.com/atom/ns#" term="Xbox"/><title type='text'>Copy XBox games</title><content type='html'>BURNING X-BOX &amp; GAMECUBE GAMES USEING CDRWIN&lt;br /&gt;------------------------------------------------------&lt;br /&gt;1) Insert your original in your CD-ROM.&lt;br /&gt;2) Open CDRWin (or any other image extractor) to make an iso image of the game&lt;br /&gt;on your hard disc. Click on &#39;Extract Disc/Tracks/Sectors&#39;&lt;br /&gt;3) Here are the settings which work for me (!):&lt;br /&gt;Disc Image/Cue sheet&lt;br /&gt;File-Format: Automatic&lt;br /&gt;Reading-Options:&lt;br /&gt;RAW, CD+G, CD-TEXT and MCN/USRC all Unchecked&lt;br /&gt;Error Recovery: Ignore&lt;br /&gt;Jitter Correction: Auto&lt;br /&gt;Subcode Analyses: Fixed&lt;br /&gt;Data-Speed: MAX&lt;br /&gt;Read Retry Count: 10&lt;br /&gt;Audio Speed: MAX&lt;br /&gt;Subcode Threshold: 900&lt;br /&gt;There are a lot of reports, that Raw reading also works, but I had problems with it enabled.&lt;br /&gt;4) Click on &#39;Start&#39;&lt;br /&gt;--------------------------------------------------------------------------------&lt;br /&gt;RECORDING TO A DISC&lt;br /&gt;--------------------------------------------------------------------------------&lt;br /&gt;1) Install Fireburner&lt;br /&gt;&lt;br /&gt;2) Double click on the Cue File For The Game&lt;br /&gt;3) Right Click And select burn To CD&lt;br /&gt;That?s all there is record DAO, and you can try to burn it fast at 2X&lt;br /&gt;Using PNY Black Diamond CDR&#39;</content><link rel='replies' type='application/atom+xml' href='http://cyberztutorial.blogspot.com/feeds/2270802951643947935/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://cyberztutorial.blogspot.com/2009/03/copy-xbox-games.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3812921815264375231/posts/default/2270802951643947935'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3812921815264375231/posts/default/2270802951643947935'/><link rel='alternate' type='text/html' href='http://cyberztutorial.blogspot.com/2009/03/copy-xbox-games.html' title='Copy XBox games'/><author><name>THIEF</name><uri>http://www.blogger.com/profile/02562742835916644821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhW2nZSZ302EnOUf8zLgi7E2LmJa6LNLiwsnknKUF8ty4CI22DVk3BMp9_vL7ZZ_WkL12NChQuBhZx7RLaFhc6R1M1QJb7p3PEV4vKJ_iBg-PR_EXxe-06qXeTdv4rr6Q/s220/Image016.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3812921815264375231.post-4672293236454632607</id><published>2009-03-23T01:20:00.000-07:00</published><updated>2009-03-23T01:23:48.738-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="BOOT"/><category scheme="http://www.blogger.com/atom/ns#" term="bootable"/><category scheme="http://www.blogger.com/atom/ns#" term="download"/><category scheme="http://www.blogger.com/atom/ns#" term="microsoft"/><category scheme="http://www.blogger.com/atom/ns#" term="service pack"/><category scheme="http://www.blogger.com/atom/ns#" term="slipstreaming"/><category scheme="http://www.blogger.com/atom/ns#" term="xp"/><title type='text'>Create Bootable XP SP integrated CD(SLIPSTREAMING)</title><content type='html'>Slipstreaming Windows XP Service Pack 1a and Create Bootable CD&lt;br /&gt;&lt;br /&gt;Slipstreaming a Service Pack, is the process to integrate the Service Pack into the installation so that with every new installation the Operating System and Service Pack are installed at the same time.&lt;br /&gt;&lt;br /&gt;Slipstreaming is usually done on network shares on corporate systems. But with the advent of CD burners, it does actually make some sense for the home user or small business user to do the same.&lt;br /&gt;&lt;br /&gt;Microsoft added the ability to Slipstream a Service Pack to Windows 2000 and Windows XP. It not only has the advantage that when you (re)install your OS, you don&#39;t have to apply the Service Pack later, also if you update any Windows component later, you&#39;ll be sure that you get the correct installation files if Windows needs any.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Slipstream Windows XP Service Pack 1a:&lt;br /&gt;CODE&lt;br /&gt;http://download.microsoft.com/download/5/4/f/54f8bcf8-bb4d-4613-8ee7-db69d01735ed/xpsp1a_en_x86.exe&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Download the (full) &quot;Network Install&quot; of the Service Pack (English version [125 MB]), and save it to a directory (folder) on your hard drive (in my case D:\XP-SP1). Other languages can be downloaded from the Windows XP Web site.&lt;br /&gt;&lt;br /&gt;Microsoft recently released Windows XP SP1a. The only difference is that this Service Pack does no longer include Microsoft&#39;s dated Java version. If you have already installed Windows XP SP1, there is no reason to install SP1a, but the &quot;older&quot; SP1 (with MS Java) is no longer available for download.&lt;br /&gt;&lt;br /&gt;Next copy your Windows XP CD to your hard drive. Just create a folder (I used \XP-CD), and copy all the contents of your Windows XP CD in that folder.&lt;br /&gt;&lt;br /&gt;Now create a folder to hold the Service Pack 1a (SP1a) files you are about to extract. I named it \XP-SP1. Next, open a Command Prompt (Start &gt; Run &gt; cmd), and go to the folder where you downloaded SP1a (cd \foldername). Type the command: servicepack filename -x. A small window will appear, and you need to point it to the folder where you want to extract the SP1 files. Click Ok to start extracting the SP1a files.&lt;br /&gt;&lt;br /&gt;Once the SP1a files are extracted, change to the update folder of the SP1a files (cd update), and type the following command: update /s:path to WinXP CD files. In my example the command is update /s:D:\XP-CD).&lt;br /&gt;&lt;br /&gt;Windows XP Update will do its thing:&lt;br /&gt;&lt;br /&gt;When ready, you should get a confirmation. Windows XP Service Pack 1a has now been Slipstreamed into your original Windows XP files.&lt;br /&gt;&lt;br /&gt;It is also possible to add the Windows XP Rollup 1 Update. For instructions, please read Adding Windows XP Rollup 1 Hotfix.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Creating a Bootable CD&lt;br /&gt;For this part I used ISO Buster&lt;br /&gt;CODE&lt;br /&gt;http://www.smart-projects.net/isobuster/&lt;br /&gt;&lt;br /&gt;and Nero Burning.&lt;br /&gt;&lt;br /&gt;Start to extract the boot loader from the original Windows XP CD. Using ISO Buster, select the &quot;folder&quot; Bootable CD, and right-click Microsoft Corporation.img. From the menu choose Extract Microsoft Corporation.img, and extract it to the folder on your hard drive where you have your Windows XP files (D:\XP-CD in my case).&lt;br /&gt;&lt;br /&gt;Next, start Nero Burning ROM, and choose CD-ROM (Boot) in the New Compilation window. On the Boot tab, select Image file under Source of boot image data, and browse to the location of the Microsoft Corporation.img file. Also enable Expert Settings, choosing No Emulation, and changing the Number of loaded sectors to 4 (otherwise it won&#39;t boot!)&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;If you have an older version of Nero you won&#39;t have the option Do Not Add &quot;;1&quot; ISO file version extention under Relax ISO Restrictions. You won&#39;t be able to boot your new CD, so update Nero!&lt;br /&gt;You can configure the Label tab to your liking, I would however recommend that you keep the Volume Label the same as on your original Windows XP CD.&lt;br /&gt;&lt;br /&gt;Next press New, and drag &amp; drop the files and folders from your Windows XP hard drive location into Nero.&lt;br /&gt;&lt;br /&gt;Next, burn your new CD.&lt;br /&gt;&lt;br /&gt;You now have a Bootable, Slipstreamed Windows XP Service Pack 1a CD!</content><link rel='replies' type='application/atom+xml' href='http://cyberztutorial.blogspot.com/feeds/4672293236454632607/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://cyberztutorial.blogspot.com/2009/03/create-bootable-xp-sp-integrated.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3812921815264375231/posts/default/4672293236454632607'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3812921815264375231/posts/default/4672293236454632607'/><link rel='alternate' type='text/html' href='http://cyberztutorial.blogspot.com/2009/03/create-bootable-xp-sp-integrated.html' title='Create Bootable XP SP integrated CD(SLIPSTREAMING)'/><author><name>THIEF</name><uri>http://www.blogger.com/profile/02562742835916644821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhW2nZSZ302EnOUf8zLgi7E2LmJa6LNLiwsnknKUF8ty4CI22DVk3BMp9_vL7ZZ_WkL12NChQuBhZx7RLaFhc6R1M1QJb7p3PEV4vKJ_iBg-PR_EXxe-06qXeTdv4rr6Q/s220/Image016.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3812921815264375231.post-1898463801281866933</id><published>2009-03-20T10:58:00.000-07:00</published><updated>2009-03-22T14:13:02.888-07:00</updated><title type='text'>All About Movie Tags(divx cam etc)</title><content type='html'>Original Sources&lt;br /&gt;&lt;br /&gt;CAM -&lt;br /&gt;A cam is a theater rip usually done with a digital video camera. A mini tripod is sometimes used, but a lot of the time this wont be possible, so the camera make shake. Also seating placement isn&#39;t always idle, and it might be filmed from an angle. If cropped properly, this is hard to tell unless there&#39;s text on the screen, but a lot of times these are left with triangular borders on the top and bottom of the screen. Sound is taken from the onboard microphone of the camera, and especially in comedies, laughter can often be heard during the film. Due to these factors picture and sound quality are usually quite poor, but sometimes we&#39;re lucky, and the theater will be fairly empty and a fairly clear signal will be heard.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;TELESYNC (TS) - A telesync is the same spec as a CAM except it uses an external audio source (most likely an audio jack in the chair for hard of hearing people). A direct audio source does not ensure a good quality audio source, as a lot of background noise can interfere. A lot of the times a telesync is filmed in an empty cinema or from the projection booth with a professional camera, giving a better picture quality. Quality ranges drastically, check the sample before downloading the full release. A high percentage of Telesyncs are CAMs that have been mislabeled.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;TELECINE (TC) -&lt;br /&gt;A telecine machine copies the film digitally from the reels. Sound and picture should be very good, but due to the equipment involved and cost telecines are fairly uncommon. Generally the film will be in correct aspect ratio, although 4:3 telecines have existed. A great example is the JURASSIC PARK 3 TC done last year. TC should not be confused with TimeCode , which is a visible counter on screen throughout the film.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;SCREENER (SCR) -&lt;br /&gt;A pre VHS tape, sent to rental stores, and various other places for promotional use. A screener is supplied on a VHS tape, and is usually in a 4:3 (full screen) a/r, although letterboxed screeners are sometimes found. The main draw back is a &quot;ticker&quot; (a message that scrolls past at the bottom of the screen, with the copyright and anti-copy telephone number). Also, if the tape contains any serial numbers, or any other markings that could lead to the source of the tape, these will have to be blocked, usually with a black mark over the section. This is sometimes only for a few seconds, but unfortunately on some copies this will last for the entire film, and some can be quite big. Depending on the equipment used, screener quality can range from excellent if done from a MASTER copy, to very poor if done on an old VHS recorder thru poor capture equipment on a copied tape. Most screeners are transferred to VCD, but a few attempts at SVCD have occurred, some looking better than others.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;DVD-SCREENER (DVDscr) -Same premise as a screener, but transferred off a DVD. Usually letterbox , but without the extras that a DVD retail would contain. The ticker is not usually in the black bars, and will disrupt the viewing. If the ripper has any skill, a DVDscr should be very good. Usually transferred to SVCD or DivX/XviD.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;DVDRip - A copy of the final released DVD. If possible this is released PRE retail (for example, Star Wars episode 2) again, should be excellent quality. DVDrips are released in SVCD and DivX/XviD.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;VHSRip -Transferred off a retail VHS, mainly skating/sports videos and XXX releases.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;TVRip -TV episode that is either from Network (capped using digital cable/satellite boxes are preferable) or PRE-AIR from satellite feeds sending the program around to networks a few days earlier (do not contain &quot;dogs&quot; but sometimes have flickers etc) Some programs such as WWF Raw Is War contain extra parts, and the &quot;dark matches&quot; and camera/commentary tests are included on the rips. PDTV is capped from a digital TV PCI card, generally giving the best results, and groups tend to release in SVCD for these. VCD/SVCD/DivX/XviD rips are all supported by the TV scene.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;WORKPRINT (WP) -A workprint is a copy of the film that has not been finished. It can be missing scenes, music, and quality can range from excellent to very poor. Some WPs are very different from the final print (Men In Black is missing all the aliens, and has actors in their places) and others can contain extra scenes (Jay and Silent Bob) . WPs can be nice additions to the collection once a good quality final has been obtained.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;DivX Re-Enc -A DivX re-enc is a film that has been taken from its original VCD source, and re-encoded into a small DivX file. Most commonly found on file sharers, these are usually labeled something like Film.Name.Group(1of2) etc. Common groups are SMR and TND. These aren&#39;t really worth downloading, unless you&#39;re that unsure about a film u only want a 200mb copy of it. Generally avoid.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Watermarks -&lt;br /&gt;A lot of films come from Asian Silvers/PDVD (see below) and these are tagged by the people responsible. Usually with a letter/initials or a little logo, generally in one of the corners. Most famous are the &quot;Z&quot; &quot;A&quot; and &quot;Globe&quot; watermarks.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Asian Silvers / PDVD -&lt;br /&gt;These are films put out by eastern bootleggers, and these are usually bought by some groups to put out as their own. Silvers are very cheap and easily available in a lot of countries, and its easy to put out a release, which is why there are so many in the scene at the moment, mainly from smaller groups who don&#39;t last more than a few releases. PDVDs are the same thing pressed onto a DVD. They have removable subtitles, and the quality is usually better than the silvers. These are ripped like a normal DVD, but usually released as VCD.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Formats&lt;br /&gt;&lt;br /&gt;VCD -&lt;br /&gt;VCD is an mpeg1 based format, with a constant bitrate of 1150kbit at a resolution of 352x240 (NTCS). VCDs are generally used for lower quality transfers (CAM/TS/TC/Screener(VHS)/TVrip(analogue) in order to make smaller file sizes, and fit as much on a single disc as possible. Both VCDs and SVCDs are timed in minutes, rather than MB, so when looking at an mpeg, it may appear larger than the disc capacity, and in reality u can fit 74min on a CDR74.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;SVCD -&lt;br /&gt;SVCD is an mpeg2 based (same as DVD) which allows variable bit-rates of up to 2500kbits at a resolution of 480x480 (NTSC) which is then decompressed into a 4:3 aspect ratio when played back. Due to the variable bit-rate, the length you can fit on a single CDR is not fixed, but generally between 35-60 Mins are the most common. To get a better SVCD encode using variable bit-rates, it is important to use multiple &quot;passes&quot;. this takes a lot longer, but the results are far clearer.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;XVCD/XSVCD -&lt;br /&gt;These are basically VCD/SVCD that don&#39;t obey the &quot;rules&quot;. They are both capable of much higher resolutions and bit-rates, but it all depends on the player to whether the disc can be played. X(S)VCD are total non-standards, and are usually for home-ripping by people who don&#39;t intend to release them.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;KVCD Thanks for lardo4life for the info&lt;br /&gt;KVCD is a modification to the standard MPEG-1 and MPEG-2 GOP structure and Quantization Matrix. It enables you to create over 120 minutes of near DVD quality video, depending on your material, on a single 80 minute CD-R/CD-RW. We have published these specifications as KVCDx3, our official resolution, which produce 528x480 (NTSC) and 528x576 (PAL) MPEG-1 variable bit rate video, from 64Kbps to 3,000Kbps. Using a resolution of 352x240 (NTSC) or 352x288 (PAL), it&#39;s possible to encode video up to ~360 minutes of near VCD quality on a single 80 minute CD-R. The mpeg files created will play back in most modern standalone DVD players. You must burn the KVCD MPEG files as non-standard VCD or non-standard SVCD (depends on your player) with Nero or VCDEasy.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;DivX / XviD -&lt;br /&gt;DivX is a format designed for multimedia platforms. It uses two codecs, one low motion, one high motion. most older films were encoded in low motion only, and they have problems with high motion too. A method known as SBC (Smart Bit-rate Control) was developed which switches codecs at the encoding stage, making a much better print. The format is Ana orphic and the bit-rate/resolution are interchangeable. Due to the higher processing power required, and the different codecs for playback, its unlikely we&#39;ll see a DVD player capable of play DivX for quite a while, if at all. There have been players in development which are supposedly capable, but nothing has ever arisen. The majority of PROPER DivX rips (not Re-Encs) are taken from DVDs, and generally up to 2hours in good quality is possible per disc. Various codecs exist, most popular being the original Divx3.11a and the new XviD codecs.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;CVD -&lt;br /&gt;CVD is a combination of VCD and SVCD formats, and is generally supported by a majority of DVD players. It supports MPEG2 bit-rates of SVCD, but uses a resolution of 352x480(ntsc) as the horizontal resolution is generally less important. Currently no groups release in CVD.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;DVD-R -&lt;br /&gt;Is the recordable DVD solution that seems to be the most popular (out of DVD-RAM, DVD-R and DVD+R). it holds 4.7gb of data per side, and double sided discs are available, so discs can hold nearly 10gb in some circumstances. SVCD mpeg2 images must be converted before they can be burnt to DVD-R and played successfully. DVD&gt;DVDR copies are possible, but sometimes extras/languages have to be removed to stick within the available 4.7gb.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;MiniDVD -&lt;br /&gt;MiniDVD/cDVD is the same format as DVD but on a standard CDR/CDRW. Because of the high resolution/bit-rates, its only possible to fit about 18-21 mins of footage per disc, and the format is only compatible with a few players.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Misc Info&lt;br /&gt;&lt;br /&gt;Regional Coding -&lt;br /&gt;This was designed to stop people buying American DVDs and watching them earlier in other countries, or for older films where world distribution is handled by different companies. A lot of players can either be hacked with a chip, or via a remote to disable this.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;RCE -&lt;br /&gt;RCE (Regional Coding Enhancement) was designed to overcome &quot;Multiregion&quot; players, but it had a lot of faults and was overcome. Very few titles are RCE encoded now, and it was very unpopular.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Macrovision -&lt;br /&gt;Macrovision is the copy protection employed on most commercial DVDs. Its a system that will display lines and darken the images of copies that are made by sending the VHS signals it can&#39;t understand. Certain DVD players (for example the Dansai 852 from Tescos) have a secret menu where you can disable the macrovision, or a &quot;video stabaliser&quot; costs about 30UKP from Maplin (www.maplin.co.uk)&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;NTSC/PAL -&lt;br /&gt;NTSC and PAL are the two main standards used across the world. NTSC has a higher frame rate than pal (29fps compared to 25fps) but PAL has an increased resolution, and gives off a generally sharper picture. Playing NTSC discs on PAL systems seems a lot easier than vice-versa, which is good news for the Brits An RGB enabled scart lead will play an NTSC picture in full colour on most modern tv sets, but to record this to a VHS tape, you will need to convert it to PAL50 (not PAL60 as the majority of DVD players do.) This is either achieved by an expensive converter box (in the regions of £200+) an onboard converter (such as the Dansai 852 / certain Daewoos / Samsung 709 ) or using a World Standards VCR which can record in any format.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;News Sites -&lt;br /&gt;There are generally 2 news sites for film release for p2p and they are:&lt;br /&gt;&lt;br /&gt;nforce - VCD Help&lt;br /&gt;Code:&lt;br /&gt;http://www.vcdhelp.com/&lt;br /&gt;&lt;br /&gt;Code:&lt;br /&gt;http://www.nforce.nl.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;About Release Files&lt;br /&gt;&lt;br /&gt;RARset -&lt;br /&gt;The movies are all supplied in RAR form, whether its v2 (rar&gt;.rxx) or v3 (part01.rar &gt; partxx.rar) form.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;BIN/CUE -&lt;br /&gt;VCD and SVCD films will extract to give a BIN/CUE. Load the .CUE into notepad and make sure the first line contains only a filename, and no path information. Then load the cue into Nero/CDRWin etc and this will burn the VCD/SVCD correctly. TV rips are released as MPEG. DivX files are just the plain DivX - .AVI&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;NFO -&lt;br /&gt;An NFO file is supplied with each movie to promote the group, and give general iNFOrmation about the release, such as format, source, size, and any notes that may be of use. They are also used to recruit members and acquire hardware for the group.&lt;br /&gt;&lt;br /&gt;SFV -&lt;br /&gt;Also supplied for each disc is an SFV file. These are mainly used on site level to check each file has been uploaded correctly, but are also handy for people downloading to check they have all the files, and the CRC is correct. A program such as pdSFV or hkSFV is required to use these files.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Usenet Information&lt;br /&gt;&lt;br /&gt;Access -&lt;br /&gt;To get onto newsgroups, you will need a news server. Most ISPs supply one, but this is usually of poor retention (the amount of time the files are on server for) and poor completition (the amount of files that make it there). For the best service, a premium news server should be paid for, and these will often have bandwidth restrictions in place.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Software -&lt;br /&gt;You will need a newsreader to access the files in the binary newsgroups. There are many different readers, and its usually down to personal opinion which is best. Xnews / Forte Agent / BNR 1 / BNR 2 are amongst the popular choices. Outlook has the ability to read newsgroups, but its recommended to not use that.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Format -&lt;br /&gt;Usenet posts are often the same as those listed on VCDQUALiTY (i.e., untouched group releases) but you have to check the filenames and the description to make sure you get what you think you are getting. Generally releases should come down in .RAR sets. Posts will usually take more than one day to be uploaded, and can be spread out as far as a week.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;PAR files -&lt;br /&gt;As well as the .rxx files, you will also see files listed as .pxx/.par . These are PARITY files. Parity files are common in usenet posts, as a lot of times, there will be at least one or two damaged files on some servers. A parity file can be used to replace ANY ONE file that is missing from the rar set. The more PAR files you have, the more files you can replace. You will need a program called SMARTPAR for this.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Scene Tags&lt;br /&gt;&lt;br /&gt;PROPER -&lt;br /&gt;Due to scene rules, whoever releases the first Telesync has won that race (for example). But if the quality of that release is fairly poor, if another group has another telesync (or the same source in higher quality) then the tag PROPER is added to the folder to avoid being duped. PROPER is the most subjective tag in the scene, and a lot of people will generally argue whether the PROPER is better than the original release. A lot of groups release PROPERS just out of desperation due to losing the race. A reason for the PROPER should always be included in the NFO.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;SUBBED -&lt;br /&gt;In the case of a VCD, if a release is subbed, it usually means it has hard encoded subtitles burnt throughout the movie. These are generally in malaysian/chinese/thai etc, and sometimes there are two different languages, which can take up quite a large amount of the screen. SVCD supports switch able subtitles, so some DVDRips are released with switch able subs. This will be mentioned in the NFO file if included.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;UNSUBBED -&lt;br /&gt;When a film has had a subbed release in the past, an Unsubbed release may be released&lt;br /&gt;&lt;br /&gt;LIMITED -&lt;br /&gt;A limited movie means it has had a limited theater run, generally opening in less than 250 theaters, generally smaller films (such as art house films) are released as limited.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;INTERNAL -&lt;br /&gt;An internal release is done for several reasons. Classic DVD groups do a lot of .INTERNAL. releases, as they wont be dupe&#39;d on it. Also lower quality theater rips are done INTERNAL so not to lower the reputation of the group, or due to the amount of rips done already. An INTERNAL release is available as normal on the groups affiliate sites, but they can&#39;t be traded to other sites without request from the site ops. Some INTERNAL releases still trickle down to IRC/Newsgroups, it usually depends on the title and the popularity. Earlier in the year people referred to Centropy going &quot;internal&quot;. This meant the group were only releasing the movies to their members and site ops. This is in a different context to the usual definition.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;STV -&lt;br /&gt;Straight To Video. Was never released in theaters, and therefore a lot of sites do not allow these.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;OTHER TAGS -&lt;br /&gt;&lt;br /&gt;*WS* for widescreen (letterbox)&lt;br /&gt;*FS* for Fullscreen.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;RECODE -&lt;br /&gt;A recode is a previously released version, usually filtered through TMPGenc to remove subtitles, fix color etc. Whilst they can look better, its not looked upon highly as groups are expected to obtain their own sources.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;REPACK -&lt;br /&gt;If a group releases a bad rip, they will release a Repack which will fix the problems.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;NUKED -&lt;br /&gt;A film can be nuked for various reasons. Individual sites will nuke for breaking their rules (such as &quot;No Telesyncs&quot;) but if the film has something extremely wrong with it (no soundtrack for 20mins, CD2 is incorrect film/game etc) then a global nuke will occur, and people trading it across sites will lose their credits. Nuked films can still reach other sources such as p2p/usenet, but its a good idea to check why it was nuked first in case. If a group realise there is something wrong, they can request a nuke.&lt;br /&gt;&lt;br /&gt;NUKE REASONS :: this is a list of common reasons a film can be nuked for (generally DVDRip)&lt;br /&gt;&lt;br /&gt;** BAD A/R ** :: bad aspect ratio, ie people appear too fat/thin&lt;br /&gt;** BAD IVTC ** :: bad inverse telecine. process of converting framerates was incorrect.&lt;br /&gt;** INTERLACED ** :: black lines on movement as the field order is incorrect.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;DUPE -&lt;br /&gt;Dupe is quite simply, if something exists already, then theres no reason for it to exist again without proper reason.</content><link rel='replies' type='application/atom+xml' href='http://cyberztutorial.blogspot.com/feeds/1898463801281866933/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://cyberztutorial.blogspot.com/2009/03/all-about-movie-tagsdivx-cam-etc.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3812921815264375231/posts/default/1898463801281866933'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3812921815264375231/posts/default/1898463801281866933'/><link rel='alternate' type='text/html' href='http://cyberztutorial.blogspot.com/2009/03/all-about-movie-tagsdivx-cam-etc.html' title='All About Movie Tags(divx cam etc)'/><author><name>THIEF</name><uri>http://www.blogger.com/profile/02562742835916644821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhW2nZSZ302EnOUf8zLgi7E2LmJa6LNLiwsnknKUF8ty4CI22DVk3BMp9_vL7ZZ_WkL12NChQuBhZx7RLaFhc6R1M1QJb7p3PEV4vKJ_iBg-PR_EXxe-06qXeTdv4rr6Q/s220/Image016.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3812921815264375231.post-1317962980195116452</id><published>2009-03-17T03:18:00.000-07:00</published><updated>2009-03-22T14:13:02.910-07:00</updated><title type='text'>All about FTP(MUST READ)</title><content type='html'>Setting Up A Ftp:&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Well, since many of us have always wondered this, here it is. Long and drawn out. Also, before attempting this, realize one thing; You will have to give up your time, effort, bandwidth, and security to have a quality ftp server.&lt;br /&gt;That being said, here it goes. First of all, find out if your IP (Internet Protocol) is static (not changing) or dynamic (changes everytime you log on). To do this, first consider the fact if you have a dial up modem. If you do, chances are about 999 999 out of 1 000 000 that your IP is dynamic. To make it static, just go to a place like h*tp://www.myftp.org/ to register for a static ip address.&lt;br /&gt;&lt;br /&gt;You&#39;ll then need to get your IP. This can be done by doing this:&lt;br /&gt;Going to Start -&gt; Run -&gt; winipcfg or www.ask.com and asking &#39;What is my IP?&#39;&lt;br /&gt;&lt;br /&gt;After doing so, you&#39;ll need to download an FTP server client. Personally, I&#39;d recommend G6 FTP Server, Serv-U FTPor Bullitproof v2.15 all three of which are extremely reliable, and the norm of the ftp world.&lt;br /&gt;You can download them on this site: h*tp://www.liaokai.com/softw_en/d_index.htm&lt;br /&gt;&lt;br /&gt;First, you&#39;ll have to set up your ftp. For this guide, I will use step-by-step instructions for G6. First, you&#39;ll have to go into &#39;Setup -&gt; General&#39;. From here, type in your port # (default is 21). I recommend something unique, or something a bit larger (ex: 3069). If you want to, check the number of max users (this sets the amount of simultaneous maximum users on your server at once performing actions - The more on at once, the slower the connection and vice versa).&lt;br /&gt;&lt;br /&gt;The below options are then chooseable:&lt;br /&gt;-Launch with windows&lt;br /&gt;-Activate FTP Server on Start-up&lt;br /&gt;-Put into tray on startup&lt;br /&gt;-Allow multiple instances&lt;br /&gt;-Show &quot;Loading...&quot; status at startup&lt;br /&gt;-Scan drive(s) at startup&lt;br /&gt;-Confirm exit&lt;br /&gt;&lt;br /&gt;You can do what you want with these, as they are pretty self explanatory. The scan drive feature is nice, as is the 2nd and the last option. From here, click the &#39;options&#39; text on the left column.&lt;br /&gt;&lt;br /&gt;To protect your server, you should check &#39;login check&#39; and &#39;password check&#39;, &#39;Show relative path (a must!)&#39;, and any other options you feel you&#39;ll need. After doing so, click the &#39;advanced&#39; text in the left column. You should then leave the buffer size on the default (unless of course you know what you&#39;re doing ), and then allow the type of ftp you want.&lt;br /&gt;&lt;br /&gt;Uploading and downloading is usually good, but it&#39;s up to you if you want to allow uploads and/or downloads. For the server priority, that will determine how much conventional memory will be used and how much &#39;effort&#39; will go into making your server run smoothly.&lt;br /&gt;&lt;br /&gt;Anti-hammering is also good, as it prevents people from slowing down your speed. From here, click &#39;Log Options&#39; from the left column. If you would like to see and record every single command and clutter up your screen, leave the defaults.&lt;br /&gt;&lt;br /&gt;But, if you would like to see what is going on with the lowest possible space taken, click &#39;Screen&#39; in the top column. You should then check off &#39;Log successful logins&#39;, and all of the options in the client directry, except &#39;Log directory changes&#39;. After doing so, click &#39;Ok&#39; in the bottom left corner.&lt;br /&gt;&lt;br /&gt;You will then have to go into &#39;Setup -&gt; User Accounts&#39; (or ctrl &amp; u). From here, you should click on the right most column, and right click. Choose &#39;Add&#39;, and choose the username(s) you would like people to have access to.&lt;br /&gt;&lt;br /&gt;After giving a name (ex: themoonlanding), you will have to give them a set password in the bottom column (ex: wasfaked). For the &#39;Home IP&#39; directory, (if you registered with a static server, check &#39;All IP Homes&#39;. If your IP is static by default, choose your IP from the list. You will then have to right click in the very center column, and choose &#39;Add&#39;.&lt;br /&gt;&lt;br /&gt;From here, you will have to set the directory you want the people to have access to. After choosing the directory, I suggest you choose the options &#39;Read&#39;, &#39;List&#39;, and &#39;Subdirs&#39;, unless of course you know what you&#39;re doing . After doing so, make an &#39;upload&#39; folder in the directory, and choose to &#39;add&#39; this folder seperately to the center column. Choose &#39;write&#39;, &#39;append&#39;, &#39;make&#39;, &#39;list&#39;, and &#39;subdirs&#39;. This will allow them to upload only to specific folders (your upload folder).&lt;br /&gt;&lt;br /&gt;Now click on &#39;Miscellaneous&#39; from the left column. Choose &#39;enable account&#39;, your time-out (how long it takes for people to remain idle before you automatically kick them off), the maximum number of users for this name, the maximum number of connections allowed simultaneously for one ip address, show relative path (a must!), and any other things at the bottom you&#39;d like to have. Now click &#39;Ok&#39;.&lt;br /&gt;**Requested**&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;From this main menu, click the little boxing glove icon in the top corner, and right click and unchoose the hit-o-meter for both uploads and downloads (with this you can monitor IP activity). Now click the lightning bolt, and your server is now up and running.&lt;br /&gt;&lt;br /&gt;Post your ftp info, like this:&lt;br /&gt;&lt;br /&gt;213.10.93.141 (or something else, such as: &#39;f*p://example.getmyip.com&#39;)&lt;br /&gt;&lt;br /&gt;User: *** (The username of the client)&lt;br /&gt;&lt;br /&gt;Pass: *** (The password)&lt;br /&gt;&lt;br /&gt;Port: *** (The port number you chose)&lt;br /&gt;&lt;br /&gt;So make a FTP and join the FTP section&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Listing The Contents Of A Ftp:&lt;br /&gt;&lt;br /&gt;Listing the content of a FTP is very simple.&lt;br /&gt;You will need FTP Content Maker, which can be downloaded from here:&lt;br /&gt;ht*p://www.etplanet.com/download/application/FTP%20Content%20Maker%201.02.zip&lt;br /&gt;&lt;br /&gt;1. Put in the IP of the server. Do not put &quot;ftp://&quot; or a &quot;/&quot; because it will not work if you do so.&lt;br /&gt;2. Put in the port. If the port is the default number, 21, you do not have to enter it.&lt;br /&gt;3. Put in the username and password in the appropriate fields. If the login is anonymous, you do not have to enter it.&lt;br /&gt;4. If you want to list a specific directory of the FTP, place it in the directory field. Otherwise, do not enter anything in the directory field.&lt;br /&gt;5. Click &quot;Take the List!&quot;&lt;br /&gt;6. After the list has been taken, click the UBB output tab, and copy and paste to wherever you want it.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;If FTP Content Maker is not working, it is probably because the server does not utilize Serv-U Software.&lt;br /&gt;&lt;br /&gt;If you get this error message:&lt;br /&gt;StatusCode = 550&lt;br /&gt;LastResponse was : &#39;Unable to open local file test-ftp&#39;&lt;br /&gt;Error = 550 (Unable to open local file test-ftp)&lt;br /&gt;Error = Unable to open local file test-ftp = 550&lt;br /&gt;Close and restart FTP Content Maker, then try again.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;error messages:&lt;br /&gt;&lt;br /&gt;110 Restart marker reply. In this case, the text is exact and not left to the particular implementation; it must read: MARK yyyy = mmmm Where yyyy is User-process data stream marker, and mmmm server&#39;s equivalent marker (note the spaces between markers and &quot;=&quot;).&lt;br /&gt;120 Service ready in nnn minutes.&lt;br /&gt;125 Data connection already open; transfer starting.&lt;br /&gt;150 File status okay; about to open data connection.&lt;br /&gt;200 Command okay.&lt;br /&gt;202 Command not implemented, superfluous at this site.&lt;br /&gt;211 System status, or system help reply.&lt;br /&gt;212 Directory status.&lt;br /&gt;213 File status.&lt;br /&gt;214 Help message. On how to use the server or the meaning of a particular non-standard command. This reply is useful only to the human user.&lt;br /&gt;215 NAME system type. Where NAME is an official system name from the list in the Assigned Numbers document.&lt;br /&gt;220 Service ready for new user.&lt;br /&gt;221 Service closing control connection. Logged out if appropriate.&lt;br /&gt;225 Data connection open; no transfer in progress.&lt;br /&gt;226 Closing data connection. Requested file action successful (for example, file transfer or file abort).&lt;br /&gt;227 Entering Passive Mode (h1,h2,h3,h4,p1,p2).&lt;br /&gt;230 User logged in, proceed.&lt;br /&gt;250 Requested file action okay, completed.&lt;br /&gt;257 &quot;PATHNAME&quot; created.&lt;br /&gt;331 User name okay, need password.&lt;br /&gt;332 Need account for login.&lt;br /&gt;350 Requested file action pending further information.&lt;br /&gt;421 Too many users logged to the same account&lt;br /&gt;425 Can&#39;t open data connection.&lt;br /&gt;426 Connection closed; transfer aborted.&lt;br /&gt;450 Requested file action not taken. File unavailable (e.g., file busy).&lt;br /&gt;451 Requested action aborted: local error in processing.&lt;br /&gt;452 Requested action not taken. Insufficient storage space in system.&lt;br /&gt;500 Syntax error, command unrecognized. This may include errors such as command line too long.&lt;br /&gt;501 Syntax error in parameters or arguments.&lt;br /&gt;502 Command not implemented.&lt;br /&gt;503 Bad sequence of commands.&lt;br /&gt;504 Command not implemented for that parameter.&lt;br /&gt;530 Not logged in.&lt;br /&gt;532 Need account for storing files.&lt;br /&gt;550 Requested action not taken. File unavailable (e.g., file not found, no access).&lt;br /&gt;551 Requested action aborted: page type unknown.&lt;br /&gt;552 Requested file action aborted. Exceeded storage allocation (for current directory or dataset).&lt;br /&gt;553 Requested action not taken. File name not allowed.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt; Active FTP vs. Passive FTP, a Definitive Explanation&lt;br /&gt;&lt;br /&gt;Introduction&lt;br /&gt;One of the most commonly seen questions when dealing with firewalls and other Internet connectivity issues is the difference between active and passive FTP and how best to support either or both of them. Hopefully the following text will help to clear up some of the confusion over how to support FTP in a firewalled environment.&lt;br /&gt;&lt;br /&gt;This may not be the definitive explanation, as the title claims, however, I&#39;ve heard enough good feedback and seen this document linked in enough places to know that quite a few people have found it to be useful. I am always looking for ways to improve things though, and if you find something that is not quite clear or needs more explanation, please let me know! Recent additions to this document include the examples of both active and passive command line FTP sessions. These session examples should help make things a bit clearer. They also provide a nice picture into what goes on behind the scenes during an FTP session. Now, on to the information...&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;The Basics&lt;br /&gt;FTP is a TCP based service exclusively. There is no UDP component to FTP. FTP is an unusual service in that it utilizes two ports, a &#39;data&#39; port and a &#39;command&#39; port (also known as the control port). Traditionally these are port 21 for the command port and port 20 for the data port. The confusion begins however, when we find that depending on the mode, the data port is not always on port 20.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Active FTP&lt;br /&gt;In active mode FTP the client connects from a random unprivileged port (N &gt; 1024) to the FTP server&#39;s command port, port 21. Then, the client starts listening to port N+1 and sends the FTP command PORT N+1 to the FTP server. The server will then connect back to the client&#39;s specified data port from its local data port, which is port 20.&lt;br /&gt;&lt;br /&gt;From the server-side firewall&#39;s standpoint, to support active mode FTP the following communication channels need to be opened:&lt;br /&gt;&lt;br /&gt;FTP server&#39;s port 21 from anywhere (Client initiates connection)&lt;br /&gt;FTP server&#39;s port 21 to ports &gt; 1024 (Server responds to client&#39;s control port)&lt;br /&gt;FTP server&#39;s port 20 to ports &gt; 1024 (Server initiates data connection to client&#39;s data port)&lt;br /&gt;FTP server&#39;s port 20 from ports &gt; 1024 (Client sends ACKs to server&#39;s data port)&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;In step 1, the client&#39;s command port contacts the server&#39;s command port and sends the command PORT 1027. The server then sends an ACK back to the client&#39;s command port in step 2. In step 3 the server initiates a connection on its local data port to the data port the client specified earlier. Finally, the client sends an ACK back as shown in step 4.&lt;br /&gt;&lt;br /&gt;The main problem with active mode FTP actually falls on the client side. The FTP client doesn&#39;t make the actual connection to the data port of the server--it simply tells the server what port it is listening on and the server connects back to the specified port on the client. From the client side firewall this appears to be an outside system initiating a connection to an internal client--something that is usually blocked.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Active FTP Example&lt;br /&gt;Below is an actual example of an active FTP session. The only things that have been changed are the server names, IP addresses, and user names. In this example an FTP session is initiated from testbox1.slacksite.com (192.168.150.80), a linux box running the standard FTP command line client, to testbox2.slacksite.com (192.168.150.90), a linux box running ProFTPd 1.2.2RC2. The debugging (-d) flag is used with the FTP client to show what is going on behind the scenes. Everything in red is the debugging output which shows the actual FTP commands being sent to the server and the responses generated from those commands. Normal server output is shown in black, and user input is in bold.&lt;br /&gt;&lt;br /&gt;There are a few interesting things to consider about this dialog. Notice that when the PORT command is issued, it specifies a port on the client (192.168.150.80) system, rather than the server. We will see the opposite behavior when we use passive FTP. While we are on the subject, a quick note about the format of the PORT command. As you can see in the example below it is formatted as a series of six numbers separated by commas. The first four octets are the IP address while the second two octets comprise the port that will be used for the data connection. To find the actual port multiply the fifth octet by 256 and then add the sixth octet to the total. Thus in the example below the port number is ( (14*256) + 178), or 3762. A quick check with netstat should confirm this information.&lt;br /&gt;&lt;br /&gt;testbox1: {/home/p-t/slacker/public_html} % ftp -d testbox2&lt;br /&gt;Connected to testbox2.slacksite.com.&lt;br /&gt;220 testbox2.slacksite.com FTP server ready.&lt;br /&gt;Name (testbox2:slacker): slacker&lt;br /&gt;---&gt; USER slacker&lt;br /&gt;331 Password required for slacker.&lt;br /&gt;Password: TmpPass&lt;br /&gt;---&gt; PASS XXXX&lt;br /&gt;230 User slacker logged in.&lt;br /&gt;---&gt; SYST&lt;br /&gt;215 UNIX Type: L8&lt;br /&gt;Remote system type is UNIX.&lt;br /&gt;Using binary mode to transfer files.&lt;br /&gt;ftp&gt; ls&lt;br /&gt;ftp: setsockopt (ignored): Permission denied&lt;br /&gt;---&gt; PORT 192,168,150,80,14,178&lt;br /&gt;200 PORT command successful.&lt;br /&gt;---&gt; LIST&lt;br /&gt;150 Opening ASCII mode data connection for file list.&lt;br /&gt;drwx------ 3 slacker users 104 Jul 27 01:45 public_html&lt;br /&gt;226 Transfer complete.&lt;br /&gt;ftp&gt; quit&lt;br /&gt;---&gt; QUIT&lt;br /&gt;221 Goodbye.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Passive FTP&lt;br /&gt;In order to resolve the issue of the server initiating the connection to the client a different method for FTP connections was developed. This was known as passive mode, or PASV, after the command used by the client to tell the server it is in passive mode.&lt;br /&gt;&lt;br /&gt;In passive mode FTP the client initiates both connections to the server, solving the problem of firewalls filtering the incoming data port connection to the client from the server. When opening an FTP connection, the client opens two random unprivileged ports locally (N &gt; 1024 and N+1). The first port contacts the server on port 21, but instead of then issuing a PORT command and allowing the server to connect back to its data port, the client will issue the PASV command. The result of this is that the server then opens a random unprivileged port (P &gt; 1024) and sends the PORT P command back to the client. The client then initiates the connection from port N+1 to port P on the server to transfer data.&lt;br /&gt;&lt;br /&gt;From the server-side firewall&#39;s standpoint, to support passive mode FTP the following communication channels need to be opened:&lt;br /&gt;&lt;br /&gt;FTP server&#39;s port 21 from anywhere (Client initiates connection)&lt;br /&gt;FTP server&#39;s port 21 to ports &gt; 1024 (Server responds to client&#39;s control port)&lt;br /&gt;FTP server&#39;s ports &gt; 1024 from anywhere (Client initiates data connection to random port specified by server)&lt;br /&gt;FTP server&#39;s ports &gt; 1024 to remote ports &gt; 1024 (Server sends ACKs (and data) to client&#39;s data port)&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;In step 1, the client contacts the server on the command port and issues the PASV command. The server then replies in step 2 with PORT 2024, telling the client which port it is listening to for the data connection. In step 3 the client then initiates the data connection from its data port to the specified server data port. Finally, the server sends back an ACK in step 4 to the client&#39;s data port.&lt;br /&gt;&lt;br /&gt;While passive mode FTP solves many of the problems from the client side, it opens up a whole range of problems on the server side. The biggest issue is the need to allow any remote connection to high numbered ports on the server. Fortunately, many FTP daemons, including the popular WU-FTPD allow the administrator to specify a range of ports which the FTP server will use. See Appendix 1 for more information.&lt;br /&gt;&lt;br /&gt;The second issue involves supporting and troubleshooting clients which do (or do not) support passive mode. As an example, the command line FTP utility provided with Solaris does not support passive mode, necessitating a third-party FTP client, such as ncftp.&lt;br /&gt;&lt;br /&gt;With the massive popularity of the World Wide Web, many people prefer to use their web browser as an FTP client. Most browsers only support passive mode when accessing ftp:// URLs. This can either be good or bad depending on what the servers and firewalls are configured to support.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Passive FTP Example&lt;br /&gt;Below is an actual example of a passive FTP session. The only things that have been changed are the server names, IP addresses, and user names. In this example an FTP session is initiated from testbox1.slacksite.com (192.168.150.80), a linux box running the standard FTP command line client, to testbox2.slacksite.com (192.168.150.90), a linux box running ProFTPd 1.2.2RC2. The debugging (-d) flag is used with the FTP client to show what is going on behind the scenes. Everything in red is the debugging output which shows the actual FTP commands being sent to the server and the responses generated from those commands. Normal server output is shown in black, and user input is in bold.&lt;br /&gt;&lt;br /&gt;Notice the difference in the PORT command in this example as opposed to the active FTP example. Here, we see a port being opened on the server (192.168.150.90) system, rather than the client. See the discussion about the format of the PORT command above, in the Active FTP Example section.&lt;br /&gt;&lt;br /&gt;testbox1: {/home/p-t/slacker/public_html} % ftp -d testbox2&lt;br /&gt;Connected to testbox2.slacksite.com.&lt;br /&gt;220 testbox2.slacksite.com FTP server ready.&lt;br /&gt;Name (testbox2:slacker): slacker&lt;br /&gt;---&gt; USER slacker&lt;br /&gt;331 Password required for slacker.&lt;br /&gt;Password: TmpPass&lt;br /&gt;---&gt; PASS XXXX&lt;br /&gt;230 User slacker logged in.&lt;br /&gt;---&gt; SYST&lt;br /&gt;215 UNIX Type: L8&lt;br /&gt;Remote system type is UNIX.&lt;br /&gt;Using binary mode to transfer files.&lt;br /&gt;ftp&gt; passive&lt;br /&gt;Passive mode on.&lt;br /&gt;ftp&gt; ls&lt;br /&gt;ftp: setsockopt (ignored): Permission denied&lt;br /&gt;---&gt; PASV&lt;br /&gt;227 Entering Passive Mode (192,168,150,90,195,149).&lt;br /&gt;---&gt; LIST&lt;br /&gt;150 Opening ASCII mode data connection for file list&lt;br /&gt;drwx------ 3 slacker users 104 Jul 27 01:45 public_html&lt;br /&gt;226 Transfer complete.&lt;br /&gt;ftp&gt; quit&lt;br /&gt;---&gt; QUIT&lt;br /&gt;221 Goodbye.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Summary&lt;br /&gt;The following chart should help admins remember how each FTP mode works:&lt;br /&gt;&lt;br /&gt;Active FTP :&lt;br /&gt;command : client &gt;1024 -&gt; server 21&lt;br /&gt;data : client &gt;1024 &lt;- server 20&lt;br /&gt;&lt;br /&gt;Passive FTP :&lt;br /&gt;command : client &gt;1024 -&gt; server 21&lt;br /&gt;data : client &gt;1024 -&gt; server &gt;1024&lt;br /&gt;&lt;br /&gt;A quick summary of the pros and cons of active vs. passive FTP is also in order:&lt;br /&gt;&lt;br /&gt;Active FTP is beneficial to the FTP server admin, but detrimental to the client side admin. The FTP server attempts to make connections to random high ports on the client, which would almost certainly be blocked by a firewall on the client side. Passive FTP is beneficial to the client, but detrimental to the FTP server admin. The client will make both connections to the server, but one of them will be to a random high port, which would almost certainly be blocked by a firewall on the server side.&lt;br /&gt;&lt;br /&gt;Luckily, there is somewhat of a compromise. Since admins running FTP servers will need to make their servers accessible to the greatest number of clients, they will almost certainly need to support passive FTP. The exposure of high level ports on the server can be minimized by specifying a limited port range for the FTP server to use. Thus, everything except for this range of ports can be firewalled on the server side. While this doesn&#39;t eliminate all risk to the server, it decreases it tremendously.</content><link rel='replies' type='application/atom+xml' href='http://cyberztutorial.blogspot.com/feeds/1317962980195116452/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://cyberztutorial.blogspot.com/2009/03/all-about-ftpmust-read.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3812921815264375231/posts/default/1317962980195116452'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3812921815264375231/posts/default/1317962980195116452'/><link rel='alternate' type='text/html' href='http://cyberztutorial.blogspot.com/2009/03/all-about-ftpmust-read.html' title='All about FTP(MUST READ)'/><author><name>THIEF</name><uri>http://www.blogger.com/profile/02562742835916644821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhW2nZSZ302EnOUf8zLgi7E2LmJa6LNLiwsnknKUF8ty4CI22DVk3BMp9_vL7ZZ_WkL12NChQuBhZx7RLaFhc6R1M1QJb7p3PEV4vKJ_iBg-PR_EXxe-06qXeTdv4rr6Q/s220/Image016.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3812921815264375231.post-4546194286788995646</id><published>2009-03-17T03:17:00.000-07:00</published><updated>2009-03-22T14:13:02.931-07:00</updated><title type='text'>Advanced shell coding techniques</title><content type='html'>***********************************************&lt;br /&gt;     *                                             *&lt;br /&gt;     * Advanced Shellcoding Techniques - by Thief *&lt;br /&gt;     *                                             *&lt;br /&gt;     ***********************************************&lt;br /&gt;&lt;br /&gt;Introduction&lt;br /&gt;&lt;br /&gt;This paper assumes a working knowledge of basic shellcoding techniques, and x86 assembly, I will not rehash these in this paper.  I hope to teach you some of the lesser known shellcoding techniques that I have picked up, which will allow you to write smaller and better shellcodes.  I do not claim to have invented any of these techniques, except for the one that uses the div instruction.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;The multiplicity of mul&lt;br /&gt;&lt;br /&gt;This technique was originally developed by Sorbo of darkircop.net.  The mul instruction may, on the surface, seem mundane, and it&#39;s purpose obvious.  However, when faced with the difficult challenge of shrinking your shellcode, it proves to be quite useful.  First some background information on the mul instruction itself.&lt;br /&gt;&lt;br /&gt;mul performs an unsigned multiply of two integers.  It takes only one operand, the other is implicitly specified by the %eax register.  So, a  common mul instruction might look something like this:&lt;br /&gt;&lt;br /&gt;movl $0x0a,%eax&lt;br /&gt;mul $0x0a&lt;br /&gt;&lt;br /&gt;This would multiply the value stored in %eax by the operand of mul, which in this case would be 10*10.  The result is then implicitly stored in EDX:EAX.  The result is stored over a span of two registers because it has the potential to be considerably larger than the previous value, possibly exceeding the capacity of a single register(this is also how floating points are stored in some cases, as an interesting sidenote).&lt;br /&gt;&lt;br /&gt;So, now comes the ever-important question.  How can we use these attributes to our advantage when writing shellcode?  Well, let&#39;s think for a second, the instruction takes only one operand, therefore, since it is a very common instruction, it will generate only two bytes in our final shellcode.  It multiplies whatever is passed to it by the value stored in %eax, and stores the value in both %edx and %eax, completely overwriting the contents of both registers, regardless of whether it is necessary to do so, in order to store the result of the multiplication.  Let&#39;s put on our mathematician hats for a second, and consider this, what is the only possible result of a multiplication by 0?  The answer, as you may have guessed, is 0.  I think it&#39;s about time for some example code, so here it is:&lt;br /&gt;&lt;br /&gt;xorl %ecx,%ecx&lt;br /&gt;mul %ecx&lt;br /&gt;&lt;br /&gt;What is this shellcode doing?  Well, it 0&#39;s out the %ecx register using the xor instruction, so we now know that %ecx is 0.  Then it does a mul %ecx, which as we just learned, multiplies it&#39;s operand by the value in %eax, and then proceeds to store the result of this multiplication in EDX:EAX.  So, regardless of %eax&#39;s previous contents, %eax must now be 0.  However that&#39;s not all, %edx is 0&#39;d now too, because, even though no overflow occurs, it still overwrites the %edx register with the sign bit(left-most bit) of %eax.  Using this technique we can zero out three registers in only three bytes, whereas by any other method(that I know of) it would have taken at least six.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;The div instruction&lt;br /&gt;&lt;br /&gt;Div is very similar to mul, in that it takes only one operand and implicitly divides the operand by the value in %eax.  Also like, mul it stores the result of the divide in %eax.  Again, we will require the mathematical side of our brains to figure out how we can take advantage of this instruction.  But first, let&#39;s think about what is normally stored in the %eax register.  The %eax register holds the return value of functions and/or syscalls.  Most syscalls that are used in shellcoding will return -1(on failure) or a positive value of some kind, only rarely will they return 0(though it does occur).  So, if we know that after a syscall is performed, %eax will have a non-zero value, and that  the instruction divl %eax will divide %eax by itself, and then store the result in %eax, we can say that executing the divl %eax instruction after a syscall will put the value 1 into %eax.  So...how is this applicable to shellcoding? Well, their is another important thing that %eax is used for, and that is to pass the specific syscall that you would like to call to int $0x80.  It just so happens that the syscall that corresponds to the value 1 is exit().  Now for an example:&lt;br /&gt;&lt;br /&gt;       &lt;br /&gt;xorl %ebx,%ebx&lt;br /&gt;mul %ebx&lt;br /&gt;push %edx&lt;br /&gt;pushl   $0x3268732f&lt;br /&gt;pushl   $0x6e69622f&lt;br /&gt;mov %esp, %ebx&lt;br /&gt;push %edx&lt;br /&gt;push %ebx&lt;br /&gt;mov %esp,%ecx&lt;br /&gt;movb $0xb, %al  #execve() syscall, doesn&#39;t return at all unless it fails, in which case it returns -1&lt;br /&gt;int $0x80&lt;br /&gt;&lt;br /&gt;divl %eax  # -1 / -1 = 1&lt;br /&gt;int $0x80&lt;br /&gt;&lt;br /&gt;Now, we have a 3 byte exit function, where as before it was 5 bytes.  However, there is a catch, what if a syscall does return 0?  Well in the odd situation in which that could happen, you could do many different things, like inc %eax, dec %eax, not %eax anything that will make %eax non-zero.  Some people say that exit&#39;s are not important in shellcode, because your code gets executed regardless of whether or not it exits cleanly.  They are right too, if you really need to save 3 bytes to fit your shellcode in somewhere, the exit() isn&#39;t worth keeping.  However, when your code does finish, it will try to execute whatever was after your last instruction, which will most likely produce a SIG ILL(illegal instruction) which is a rather odd error, and will be logged by the system.  So, an exit() simply adds an extra layer of stealth to your exploit, so that even if it fails or you can&#39;t wipe all the logs, at least this part of your presence will be clear.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Unlocking the power of leal&lt;br /&gt;&lt;br /&gt;The leal instruction is an often neglected instruction in shellcode, even though it is quite useful.  Consider this short piece of shellcode.&lt;br /&gt;&lt;br /&gt;xorl %ecx,%ecx&lt;br /&gt;leal 0x10(%ecx),%eax&lt;br /&gt;&lt;br /&gt;This will load the value 17 into eax, and clear all of the extraneous bits of eax.  This occurs because the leal instruction loads a variable of the type long into it&#39;s desitination operand.  In it&#39;s normal usage, this would load the address of a variable into a register, thus creating a pointer of sorts.  However, since ecx is 0&#39;d and 0+17=17, we load the value 17 into eax instead of any kind of actual address.  In a normal shellcode we would do something like this, to accomplish the same thing:&lt;br /&gt;&lt;br /&gt;xorl %eax,%eax&lt;br /&gt;movb $0x10,%eax&lt;br /&gt;&lt;br /&gt;I can hear you saying, but that shellcode is a byte shorter than the leal one, and you&#39;re quite right.  However, in a real shellcode you may already have to 0 out a register like ecx(or any other register), so the xorl instruction in the leal shellcode isn&#39;t counted.  Here&#39;s an example:&lt;br /&gt;&lt;br /&gt;xorl    %eax,%eax&lt;br /&gt;xorl    %ebx,%ebx&lt;br /&gt;movb    $0x17,%al&lt;br /&gt;int    $0x80&lt;br /&gt;       &lt;br /&gt;xorl %ebx,%ebx&lt;br /&gt;leal 0x17(%ebx),%al&lt;br /&gt;int $0x80&lt;br /&gt;&lt;br /&gt;Both of these shellcodes call setuid(0), but one does it in 7 bytes while the other does it in 8.  Again, I hear you saying but that&#39;s only one byte it doesn&#39;t make that much of a difference, and you&#39;re right, here it doesn&#39;t make much of a difference(except for in shellcode-size pissing contests =p), but when applied to much larger shellcodes, which have many function calls and need to do things like this frequently, it can save quite a bit of space.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Conclusion&lt;br /&gt;&lt;br /&gt;I hope you all learned something, and will go out and apply your knowledge to create smaller and better shellcodes.  If you know who invented  the leal technique, please tell me and I will credit him/her.</content><link rel='replies' type='application/atom+xml' href='http://cyberztutorial.blogspot.com/feeds/4546194286788995646/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://cyberztutorial.blogspot.com/2009/03/advanced-shell-coding-techniques.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3812921815264375231/posts/default/4546194286788995646'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3812921815264375231/posts/default/4546194286788995646'/><link rel='alternate' type='text/html' href='http://cyberztutorial.blogspot.com/2009/03/advanced-shell-coding-techniques.html' title='Advanced shell coding techniques'/><author><name>THIEF</name><uri>http://www.blogger.com/profile/02562742835916644821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhW2nZSZ302EnOUf8zLgi7E2LmJa6LNLiwsnknKUF8ty4CI22DVk3BMp9_vL7ZZ_WkL12NChQuBhZx7RLaFhc6R1M1QJb7p3PEV4vKJ_iBg-PR_EXxe-06qXeTdv4rr6Q/s220/Image016.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3812921815264375231.post-7844710073716853094</id><published>2009-03-17T03:16:00.000-07:00</published><updated>2009-03-22T14:13:02.947-07:00</updated><title type='text'>A Basic Guide to the internet</title><content type='html'>The Internet is a computer network made up of thousands of networks worldwide. No one knows exactly how many computers are connected to the Internet. It is certain, however, that these number in the millions.&lt;br /&gt;&lt;br /&gt;No one is in charge of the Internet. There are organizations which develop technical aspects of this network and set standards for creating applications on it, but no governing body is in control. The Internet backbone, through which Internet traffic flows, is owned by private companies.&lt;br /&gt;&lt;br /&gt;All computers on the Internet communicate with one another using the Transmission Control Protocol/Internet Protocol suite, abbreviated to TCP/IP. Computers on the Internet use a client/server architecture. This means that the remote server machine provides files and services to the user&#39;s local client machine. Software can be installed on a client computer to take advantage of the latest access technology.&lt;br /&gt;&lt;br /&gt;An Internet user has access to a wide variety of services: electronic mail, file transfer, vast information resources, interest group membership, interactive collaboration, multimedia displays, real-time broadcasting, shopping opportunities, breaking news, and much more.&lt;br /&gt;&lt;br /&gt;The Internet consists primarily of a variety of access protocols. Many of these protocols feature programs that allow users to search for and retrieve material made available by the protocol.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;--------------------------------------------------------------------------------&lt;br /&gt;&lt;br /&gt;COMPONENTS OF THE INTERNET&lt;br /&gt;&lt;br /&gt;--------------------------------------------------------------------------------&lt;br /&gt;&lt;br /&gt;WORLD WIDE WEB&lt;br /&gt;The World Wide Web (abbreviated as the Web or WWW) is a system of Internet servers that supports hypertext to access several Internet protocols on a single interface. Almost every protocol type available on the Internet is accessible on the Web. This includes e-mail, FTP, Telnet, and Usenet News. In addition to these, the World Wide Web has its own protocol: HyperText Transfer Protocol, or HTTP. These protocols will be explained later in this document.&lt;br /&gt;&lt;br /&gt;The World Wide Web provides a single interface for accessing all these protocols. This creates a convenient and user-friendly environment. It is no longer necessary to be conversant in these protocols within separate, command-level environments. The Web gathers together these protocols into a single system. Because of this feature, and because of the Web&#39;s ability to work with multimedia and advanced programming languages, the Web is the fastest-growing component of the Internet.&lt;br /&gt;&lt;br /&gt;The operation of the Web relies primarily on hypertext as its means of information retrieval. HyperText is a document containing words that connect to other documents. These words are called links and are selectable by the user. A single hypertext document can contain links to many documents. In the context of the Web, words or graphics may serve as links to other documents, images, video, and sound. Links may or may not follow a logical path, as each connection is programmed by the creator of the source document. Overall, the Web contains a complex virtual web of connections among a vast number of documents, graphics, videos, and sounds.&lt;br /&gt;&lt;br /&gt;Producing hypertext for the Web is accomplished by creating documents with a language called HyperText Markup Language, or HTML. With HTML, tags are placed within the text to accomplish document formatting, visual features such as font size, italics and bold, and the creation of hypertext links. Graphics and multimedia may also be incorporated into an HTML document. HTML is an evolving language, with new tags being added as each upgrade of the language is developed and released. The World Wide Web Consortium (W3C), led by Web founder Tim Berners-Lee, coordinates the efforts of standardizing HTML. The W3C now calls the language XHTML and considers it to be an application of the XML language standard.&lt;br /&gt;&lt;br /&gt;The World Wide Web consists of files, called pages or home pages, containing links to documents and resources throughout the Internet.&lt;br /&gt;&lt;br /&gt;The Web provides a vast array of experiences including multimedia presentations, real-time collaboration, interactive pages, radio and television broadcasts, and the automatic &quot;push&quot; of information to a client computer. Programming languages such as Java, JavaScript, Visual Basic, Cold Fusion and XML are extending the capabilities of the Web. A growing amount of information on the Web is served dynamically from content stored in databases. The Web is therefore not a fixed entity, but one that is in a constant state of development and flux.&lt;br /&gt;&lt;br /&gt;For more complete information about the World Wide Web, see Understanding The World Wide Web.&lt;br /&gt;&lt;br /&gt;E-MAIL&lt;br /&gt;Electronic mail, or e-mail, allows computer users locally and worldwide to exchange messages. Each user of e-mail has a mailbox address to which messages are sent. Messages sent through e-mail can arrive within a matter of seconds.&lt;br /&gt;&lt;br /&gt;A powerful aspect of e-mail is the option to send electronic files to a person&#39;s e-mail address. Non-ASCII files, known as binary files, may be attached to e-mail messages. These files are referred to as MIME attachments.MIME stands for Multimedia Internet Mail Extension, and was developed to help e-mail software handle a variety of file types. For example, a document created in Microsoft Word can be attached to an e-mail message and retrieved by the recipient with the appropriate e-mail program. Many e-mail programs, including Eudora, Netscape Messenger, and Microsoft Outlook, offer the ability to read files written in HTML, which is itself a MIME type.&lt;br /&gt;&lt;br /&gt;TELNET&lt;br /&gt;Telnet is a program that allows you to log into computers on the Internet and use online databases, library catalogs, chat services, and more. There are no graphics in Telnet sessions, just text. To Telnet to a computer, you must know its address. This can consist of words (locis.loc.gov) or numbers (140.147.254.3). Some services require you to connect to a specific port on the remote computer. In this case, type the port number after the Internet address. Example: telnet nri.reston.va.us 185.&lt;br /&gt;&lt;br /&gt;Telnet is available on the World Wide Web. Probably the most common Web-based resources available through Telnet have been library catalogs, though most catalogs have since migrated to the Web. A link to a Telnet resource may look like any other link, but it will launch a Telnet session to make the connection. A Telnet program must be installed on your local computer and configured to your Web browser in order to work.&lt;br /&gt;&lt;br /&gt;With the increasing popularity of the Web, Telnet has become less frequently used as a means of access to information on the Internet.&lt;br /&gt;&lt;br /&gt;FTP&lt;br /&gt;FTP stands for File Transfer Protocol. This is both a program and the method used to transfer files between computers. Anonymous FTP is an option that allows users to transfer files from thousands of host computers on the Internet to their personal computer account. FTP sites contain books, articles, software, games, images, sounds, multimedia, course work, data sets, and more.&lt;br /&gt;&lt;br /&gt;If your computer is directly connected to the Internet via an Ethernet cable, you can use one of several PC software programs, such as WS_FTP for Windows, to conduct a file transfer.&lt;br /&gt;&lt;br /&gt;FTP transfers can be performed on the World Wide Web without the need for special software. In this case, the Web browser will suffice. Whenever you download software from a Web site to your local machine, you are using FTP. You can also retrieve FTP files via search engines such as FtpFind, located at /http://www.ftpfind.com/. This option is easiest because you do not need to know FTP program commands.&lt;br /&gt;&lt;br /&gt;E-MAIL DISCUSSION GROUPS&lt;br /&gt;One of the benefits of the Internet is the opportunity it offers to people worldwide to communicate via e-mail. The Internet is home to a large community of individuals who carry out active discussions organized around topic-oriented forums distributed by e-mail. These are administered by software programs. Probably the most common program is the listserv.&lt;br /&gt;&lt;br /&gt;A great variety of topics are covered by listservs, many of them academic in nature. When you subscribe to a listserv, messages from other subscribers are automatically sent to your electronic mailbox. You subscribe to a listserv by sending an e-mail message to a computer program called a listserver. Listservers are located on computer networks throughout the world. This program handles subscription information and distributes messages to and from subscribers. You must have a e-mail account to participate in a listserv discussion group. Visit Tile.net at /http://tile.net/ to see an example of a site that offers a searchablecollection of e-mail discussion groups.&lt;br /&gt;&lt;br /&gt;Majordomo and Listproc are two other programs that administer e-mail discussion groups. The commands for subscribing to and managing your list memberships are similar to those of listserv.&lt;br /&gt;&lt;br /&gt;USENET NEWS&lt;br /&gt;Usenet News is a global electronic bulletin board system in which millions of computer users exchange information on a vast range of topics. The major difference between Usenet News and e-mail discussion groups is the fact that Usenet messages are stored on central computers, and users must connect to these computers to read or download the messages posted to these groups. This is distinct from e-mail distribution, in which messages arrive in the electronic mailboxes of each list member.&lt;br /&gt;&lt;br /&gt;Usenet itself is a set of machines that exchanges messages, or articles, from Usenet discussion forums, called newsgroups. Usenet administrators control their own sites, and decide which (if any) newsgroups to sponsor and which remote newsgroups to allow into the system.&lt;br /&gt;&lt;br /&gt;There are thousands of Usenet newsgroups in existence. While many are academic in nature, numerous newsgroups are organized around recreational topics. Much serious computer-related work takes place in Usenet discussions. A small number of e-mail discussion groups also exist as Usenet newsgroups.&lt;br /&gt;&lt;br /&gt;The Usenet newsfeed can be read by a variety of newsreader software programs. For example, the Netscape suite comes with a newsreader program called Messenger. Newsreaders are also available as standalone products.&lt;br /&gt;&lt;br /&gt;FAQ, RFC, FYI&lt;br /&gt;FAQ stands for Frequently Asked Questions. These are periodic postings to Usenet newsgroups that contain a wealth of information related to the topic of the newsgroup. Many FAQs are quite extensive. FAQs are available by subscribing to individual Usenet newsgroups. A Web-based collection of FAQ resources has been collected by The Internet FAQ Consortium and is available at /http://www.faqs.org/.&lt;br /&gt;&lt;br /&gt;RFC stands for Request for Comments. These are documents created by and distributed to the Internet community to help define the nuts and bolts of the Internet. They contain both technical specifications and general information.&lt;br /&gt;&lt;br /&gt;FYI stands for For Your Information. These notes are a subset of RFCs and contain information of interest to new Internet users.&lt;br /&gt;&lt;br /&gt;Links to indexes of all three of these information resources are available on the University Libraries Web site at /http://library.albany.edu/reference/faqs.html.&lt;br /&gt;&lt;br /&gt;CHAT &amp; INSTANT MESSENGING&lt;br /&gt;Chat programs allow users on the Internet to communicate with each other by typing in real time. They are sometimes included as a feature of a Web site, where users can log into the &quot;chat room&quot; to exchange comments and information about the topics addressed on the site. Chat may take other, more wide-ranging forms. For example, America Online is well known for sponsoring a number of topical chat rooms.&lt;br /&gt;&lt;br /&gt;Internet Relay Chat (IRC) is a service through which participants can communicate to each other on hundreds of channels. These channels are usually based on specific topics. While many topics are frivolous, substantive conversations are also taking place. To access IRC, you must use an IRC software program.&lt;br /&gt;&lt;br /&gt;A variation of chat is the phenomenon of instant messenging. With instant messenging, a user on the Web can contact another user currently logged in and type a conversation. Most famous is America Online&#39;s Instant Messenger. ICQ, MSN and Yahoo are other commonly-used chat programs.&lt;br /&gt;&lt;br /&gt;Other types of real-time communication are addressed in the tutorial Understanding the World Wide Web.&lt;br /&gt;&lt;br /&gt;MUD/MUSH/MOO/MUCK/DUM/MUSE&lt;br /&gt;MUD stands for Multi User Dimension. MUDs, and their variations listed above, are multi-user virtual reality games based on simulated worlds. Traditionally text based, graphical MUDs now exist. There are MUDs of all kinds on the Internet, and many can be joined free of charge. For more information, read one of the FAQs devoted to MUDs available at the FAQ site at</content><link rel='replies' type='application/atom+xml' href='http://cyberztutorial.blogspot.com/feeds/7844710073716853094/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://cyberztutorial.blogspot.com/2009/03/basic-guide-to-internet.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3812921815264375231/posts/default/7844710073716853094'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3812921815264375231/posts/default/7844710073716853094'/><link rel='alternate' type='text/html' href='http://cyberztutorial.blogspot.com/2009/03/basic-guide-to-internet.html' title='A Basic Guide to the internet'/><author><name>THIEF</name><uri>http://www.blogger.com/profile/02562742835916644821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhW2nZSZ302EnOUf8zLgi7E2LmJa6LNLiwsnknKUF8ty4CI22DVk3BMp9_vL7ZZ_WkL12NChQuBhZx7RLaFhc6R1M1QJb7p3PEV4vKJ_iBg-PR_EXxe-06qXeTdv4rr6Q/s220/Image016.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3812921815264375231.post-1984674545429379850</id><published>2009-03-17T03:05:00.000-07:00</published><updated>2009-03-22T14:13:02.970-07:00</updated><title type='text'>250+ tech book online</title><content type='html'>1&lt;br /&gt;10 minute guide to lotus notes mail 4.5&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;2&lt;br /&gt;10 minute guide to Microsoft exchange 5.0&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;3&lt;br /&gt;10 minute guide to outlook 97&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;4&lt;br /&gt;10 minute guide to schedule+ for windows 95&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;5&lt;br /&gt;ActiveX programming unleashed&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;6&lt;br /&gt;ActiveX programming unleashed&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;7&lt;br /&gt;Advanced perl programming&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;8&lt;br /&gt;Advanced PL/SQL programming with packages&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;9&lt;br /&gt;Adventure in Prolog/AMZI&lt;br /&gt;www.oopweb.com&lt;br /&gt;&lt;br /&gt;10&lt;br /&gt;Algorithms CMSC251/Mount, David&lt;br /&gt;www.oopweb.com&lt;br /&gt;&lt;br /&gt;11&lt;br /&gt;Alison Balter&#39;s Mastering Access 95 development, premier ed.&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;12&lt;br /&gt;Apache : The definitive guide, 3rd.ed.&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;13&lt;br /&gt;Beej&#39;s guide to network programming/Hall, Brain&lt;br /&gt;www.oopweb.com&lt;br /&gt;&lt;br /&gt;14&lt;br /&gt;Beyond Linux from Scratch/BLFS Development Team&lt;br /&gt;http://book.onairweb.net/computer/os/linux/Administration/Beyond_Linux_From_Scratch/&lt;br /&gt;&lt;br /&gt;15&lt;br /&gt;Borland C++ builder unleashed&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;16&lt;br /&gt;Building an intranet with windows NT 4&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;17&lt;br /&gt;Building an Intranet with Windows NT 4&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;18&lt;br /&gt;Building expert systems in prolog/AMZI&lt;br /&gt;www.oopweb.com&lt;br /&gt;&lt;br /&gt;19&lt;br /&gt;C programming language&lt;br /&gt;http://book.onairweb.net/computer/pl/C/The_C_Programming_Language_by_K&amp;R/&lt;br /&gt;&lt;br /&gt;20&lt;br /&gt;C Programming/Holmes, Steven&lt;br /&gt;www.oopweb.com&lt;br /&gt;&lt;br /&gt;21&lt;br /&gt;C++ Annotations&lt;br /&gt;www.oopweb.com&lt;br /&gt;&lt;br /&gt;22&lt;br /&gt;CGI developer&#39;s guide&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;23&lt;br /&gt;CGI manual of style&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;24&lt;br /&gt;CGI manual of style online&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;25&lt;br /&gt;CGI programming&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;26&lt;br /&gt;CGI programming unleashed&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;27&lt;br /&gt;CGI programming with Perl, 2nd.ed.&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;28&lt;br /&gt;Charlie Calvert&#39;s Borland C++ builder unleashed&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;29&lt;br /&gt;Client/server computing, 2nd.ed.&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;30&lt;br /&gt;Client-server computing, 2nd.ed.&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;31&lt;br /&gt;Common LISP, the language/Steele, Guy&lt;br /&gt;www.oopweb.com&lt;br /&gt;&lt;br /&gt;32&lt;br /&gt;Compilers and compiler generators : an introduction with C++/Terry, P.D.&lt;br /&gt;www.oopweb.com&lt;br /&gt;&lt;br /&gt;33&lt;br /&gt;Complete idiot&#39;s guide to creating HTML webpage&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;34&lt;br /&gt;Computer graphics CMSC 427/Mount, David&lt;br /&gt;www.oopweb.com&lt;br /&gt;&lt;br /&gt;35&lt;br /&gt;Configuring and troubleshooting the windows NT/95 registry&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;36&lt;br /&gt;Creating commercial websites&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;37&lt;br /&gt;Creating web applets with Java&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;38&lt;br /&gt;Crystal Reports.NET&lt;br /&gt;http://www.crystalreportsbook.com/Chapters.asp&lt;br /&gt;&lt;br /&gt;39&lt;br /&gt;Curious about the internet&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;40&lt;br /&gt;Curious about the internet?&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;41&lt;br /&gt;Dan appleman&#39;s developing activeX components with Visual Basic 5&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;42&lt;br /&gt;Dan appleman&#39;s developing activex components with Visual Basic 5.0&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;43&lt;br /&gt;Data structures CMSC420/Mount, David&lt;br /&gt;www.oopweb.com&lt;br /&gt;&lt;br /&gt;44&lt;br /&gt;Database developer&#39;s guide with visual basic 4, 2nd.ed.&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;45&lt;br /&gt;Database developer&#39;s guide with Visual Basic 4, 2nd.ed.&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;46&lt;br /&gt;Database developer&#39;s guide with Visual C++ 4, 2nd.ed.&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;47&lt;br /&gt;Database developer&#39;s guide with Visual C++ 4, 2nd.ed.&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;48&lt;br /&gt;Design and analysis of computer algorithms CMSC451/Mount, David&lt;br /&gt;www.oopweb.com&lt;br /&gt;&lt;br /&gt;49&lt;br /&gt;Designing implementing Microsoft internet information server&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;50&lt;br /&gt;Designing implementing Microsoft proxy server&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;51&lt;br /&gt;Developing for netscape one&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;52&lt;br /&gt;Developing intranet applications with java&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;53&lt;br /&gt;Developing personal oracle 7 for windows 95 applications&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;54&lt;br /&gt;Developing personal Oracle 7 for windows 95 applications&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;55&lt;br /&gt;Developing professional java applets&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;56&lt;br /&gt;Developing professional java applets&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;57&lt;br /&gt;DNS and BIND&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;58&lt;br /&gt;Doing objects with VB.NET and C#&lt;br /&gt;http://vbwire.com/nl?6814&lt;br /&gt;&lt;br /&gt;59&lt;br /&gt;EAI/BPM Evaluation Series: IBM WebSphere MQ Workflow v3.3.2 &amp; EAI Suite by&lt;br /&gt;&gt; Middleware Technology Evaluation Series, Phong Tran &amp; Jeffrey Gosper&lt;br /&gt;http://www.cmis.csiro.au/mte/reports/BPM_IBMwebsphereMQ332.htm&lt;br /&gt;&lt;br /&gt;60&lt;br /&gt;Effective AWK programming&lt;br /&gt;http://book.onairweb.net/computer/os/shell/Effective_AWK_Programming/&lt;br /&gt;&lt;br /&gt;61&lt;br /&gt;Enterprise javabeans, 2nd.ed.&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;62&lt;br /&gt;Exploring java&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;63&lt;br /&gt;GNOME/Sheets, John&lt;br /&gt;www.oopweb.com&lt;br /&gt;&lt;br /&gt;64&lt;br /&gt;Graph theory/Prof. Even&lt;br /&gt;www.oopweb.com&lt;br /&gt;&lt;br /&gt;65&lt;br /&gt;Hacking java&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;66&lt;br /&gt;How intranets work&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;67&lt;br /&gt;How intranets work&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;68&lt;br /&gt;How to program visual basic 5.0&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;69&lt;br /&gt;How to use HTML 3.2&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;70&lt;br /&gt;Html : The definitive guide&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;71&lt;br /&gt;HTML 3.2 &amp; CGI unleashed&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;72&lt;br /&gt;HTML 3.2 and CGI professional reference edition unleashed&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;73&lt;br /&gt;HTML by example&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;74&lt;br /&gt;Internet firewall&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;75&lt;br /&gt;Intranets unleashed&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;76&lt;br /&gt;Introduction to object-oriented programming using C++/Muller, Peter&lt;br /&gt;www.oopweb.com&lt;br /&gt;&lt;br /&gt;77&lt;br /&gt;Introduction to programming using Java/Eck, David&lt;br /&gt;www.oopweb.com&lt;br /&gt;&lt;br /&gt;78&lt;br /&gt;Introduction to socket programming&lt;br /&gt;http://book.onairweb.net/computer/network/An_Introduction_to_Socket_Programming/&lt;br /&gt;&lt;br /&gt;79&lt;br /&gt;Java 1.1 unleashed&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;80&lt;br /&gt;Java 1.1 unleashed, 2nd.ed.&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;81&lt;br /&gt;Java 1.1 unleashed, 3rd.ed.&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;82&lt;br /&gt;Java 114 documentation&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;83&lt;br /&gt;Java AWT reference&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;84&lt;br /&gt;Java by example&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;85&lt;br /&gt;Java developer&#39;s guide&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;86&lt;br /&gt;Java developer&#39;s guide&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;87&lt;br /&gt;Java developer&#39;s reference&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;88&lt;br /&gt;Java developer&#39;s reference&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;89&lt;br /&gt;Java Distributed computing&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;90&lt;br /&gt;Java enterprise&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;91&lt;br /&gt;Java enterprise in a nutshell&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;92&lt;br /&gt;Java foundation classes in a nutshell&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;93&lt;br /&gt;Java fundamental classes reference&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;94&lt;br /&gt;Java in a nutshell&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;95&lt;br /&gt;Java in a nutshell, 3rd.ed.&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;96&lt;br /&gt;Java language reference&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;97&lt;br /&gt;Java security&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;98&lt;br /&gt;Java servlet programming&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;99&lt;br /&gt;Java unleashed&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;100&lt;br /&gt;Java unleashed&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;101&lt;br /&gt;Java, 2nd.ed.&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;102&lt;br /&gt;_JavaScript : the definitive guide&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;103&lt;br /&gt;_Javascript manual of style&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;104&lt;br /&gt;_Javascript manual of style&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;105&lt;br /&gt;Josh&#39;s GNU Linux Guide/Joshua&lt;br /&gt;http://book.onairweb.net/computer/os/linux/Administration/Josh&#39;s_GNU_Linux_Guide/&lt;br /&gt;&lt;br /&gt;106&lt;br /&gt;Late night activex&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;107&lt;br /&gt;Late night activeX&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;108&lt;br /&gt;Laura lemay&#39;s 3D graphics in and VRML 2&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;109&lt;br /&gt;Laura lemay&#39;s activex and _VBScript&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;110&lt;br /&gt;Laura lemay&#39;s graphics and web page design&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;111&lt;br /&gt;Laura lemay&#39;s guide to sizzling websites design&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;112&lt;br /&gt;Laura lemay&#39;s _javascript 1.1&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;113&lt;br /&gt;Laura lemay&#39;s web workshop activex and _VBScript&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;114&lt;br /&gt;Laura lemay&#39;s web workshop Graphics web page design&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;115&lt;br /&gt;Laura lemay&#39;s web workshop _javascript&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;116&lt;br /&gt;Learning perl&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;117&lt;br /&gt;Learning perl on win32&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;118&lt;br /&gt;Learning the kornshell&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;119&lt;br /&gt;Learning unix&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;120&lt;br /&gt;Learning vi&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;121&lt;br /&gt;Linux from Scratch/Beekmans, Gerard&lt;br /&gt;http://book.onairweb.net/computer/os/linux/Administration/Linux_From_Scratch/&lt;br /&gt;&lt;br /&gt;122&lt;br /&gt;Linux in a nutshell, 3rd.ed.&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;123&lt;br /&gt;Linux kernel/Rusling, David&lt;br /&gt;www.oopweb.com&lt;br /&gt;&lt;br /&gt;124&lt;br /&gt;Linux network administrator&#39;s guide/Dawson, Terry&lt;br /&gt;www.oopweb.com&lt;br /&gt;&lt;br /&gt;125&lt;br /&gt;Linux system administrator&#39;s survival guide&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;126&lt;br /&gt;MAPI, SAPI and TAPI developer&#39;s guide&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;127&lt;br /&gt;Mastering access 95 development&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;128&lt;br /&gt;Microsoft access 97 quick reference&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;129&lt;br /&gt;Microsoft access 97 quick reference&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;130&lt;br /&gt;Microsoft backoffice 2 unleashed&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;131&lt;br /&gt;Microsoft excel 97 quick reference&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;132&lt;br /&gt;Microsoft excel 97 quick reference&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;133&lt;br /&gt;Microsoft exchange server survival guide&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;134&lt;br /&gt;Microsoft frontpage unleashed&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;135&lt;br /&gt;Microsoft word 97 quick reference&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;136&lt;br /&gt;Microsoft word 97 quick reference&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;137&lt;br /&gt;Microsoft works 4.5 6-In-1&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;138&lt;br /&gt;More than 100 full-text e-books&lt;br /&gt;http://www.allfreetech.com/EBookCategory.asp&lt;br /&gt;&lt;br /&gt;139&lt;br /&gt;Ms backoffice administrator&#39;s survival guide&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;140&lt;br /&gt;Ms backoffice unleashed&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;141&lt;br /&gt;Mysql and msql&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;142&lt;br /&gt;Netscape plug-ins developer&#39;s kit&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;143&lt;br /&gt;Official gamelan java directory&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;144&lt;br /&gt;Oracle built-in packages&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;145&lt;br /&gt;Oracle PL/SQL built-in pocket reference&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;146&lt;br /&gt;Oracle PL/SQL language pocket reference&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;147&lt;br /&gt;Oracle PL/SQL programming guide to Oracle 8 features&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;148&lt;br /&gt;Oracle PL/SQL programming, 2nd.ed.&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;149&lt;br /&gt;Oracle unleashed&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;150&lt;br /&gt;Oracle unleashed&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;151&lt;br /&gt;Oracle web applications PL/SQL developer&#39;s introduction&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;152&lt;br /&gt;Patterns of enterprise application architecture/Fowler, Martin&lt;br /&gt;http://www.awprofessional.com/catalog/product.asp?product_id={574D77DF-6ED2-BC5-A6A8-02E59CA7482D}&lt;br /&gt;&lt;br /&gt;153&lt;br /&gt;PC week : the intranet advantage&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;154&lt;br /&gt;Perl 5 by example&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;155&lt;br /&gt;Perl 5 quick reference&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;156&lt;br /&gt;Perl 5 unleashed&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;157&lt;br /&gt;Perl 5.0 CGI web pages&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;158&lt;br /&gt;Perl cookbook&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;159&lt;br /&gt;Perl for system administration&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;160&lt;br /&gt;Perl in a nutshell&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;161&lt;br /&gt;Perl quick reference&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;162&lt;br /&gt;Peter norton&#39;s complete guide to windows NT 4 workstations&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;163&lt;br /&gt;Presenting activex&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;164&lt;br /&gt;Presenting activex&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;165&lt;br /&gt;Presenting javabeans&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;166&lt;br /&gt;Presenting javabeans&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;167&lt;br /&gt;Programming perl&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;168&lt;br /&gt;Programming perl, 3rd.ed.&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;169&lt;br /&gt;Programming the Perl DBI&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;170&lt;br /&gt;Red hat linux unleashed&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;171&lt;br /&gt;Running a perfect intranet&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;172&lt;br /&gt;Running Linux, 3rd.ed.&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;173&lt;br /&gt;Sams teach yourself java 1.1 in 24 hours/&lt;br /&gt;http://book.onairweb.net/computer/sams/Sams_Teach_Yourself_Java_1.1_Programming_in_24_Hours&lt;br /&gt;&lt;br /&gt;174&lt;br /&gt;Sams Teach yourself java in 21 days/Lemay, Laura&lt;br /&gt;http://book.onairweb.net/computer/sams/Sams_Teach_Yourself_Java_in_21_Days/&lt;br /&gt;&lt;br /&gt;175&lt;br /&gt;Sams teach yourself linux in 24 hours/Ball, Bill&lt;br /&gt;http://book.onairweb.net/computer/sams/Sams_Teach_Yourself_Linux_in_24%20Hours/&lt;br /&gt;&lt;br /&gt;176&lt;br /&gt;Sams teach yourself shell programming in 24 hours&lt;br /&gt;http://book.onairweb.net/computer/sams/Sams_Teach_Yourself_Shell_Programming_in_24_Hours/&lt;br /&gt;&lt;br /&gt;177&lt;br /&gt;Sams teach yourself TCP/IP in 14 days&lt;br /&gt;http://book.onairweb.net/computer/sams/Sams_Teach_Yourself_TCP-IP_in_14_Days(SE)/&lt;br /&gt;&lt;br /&gt;178&lt;br /&gt;Sed and awk&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;179&lt;br /&gt;Sendmail&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;180&lt;br /&gt;Sendmail desktop reference&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;181&lt;br /&gt;Slackware linux unleashed&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;182&lt;br /&gt;Special edition using java, 2nd.ed.&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;183&lt;br /&gt;Special edition using _javascript&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;184&lt;br /&gt;Special edition using _javascript&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;185&lt;br /&gt;Special edition using _Jscript&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;186&lt;br /&gt;Special edition using lotus notes and domino 4.5&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;187&lt;br /&gt;Special edition using Microsoft SQL server 6.5, 2nd.ed.&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;188&lt;br /&gt;Special edition using Microsoft visual Interdev&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;189&lt;br /&gt;Special edition using perl 5 for web programming&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;190&lt;br /&gt;Special edition using perl for web programming&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;191&lt;br /&gt;Special edition using Visual Basic 4&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;192&lt;br /&gt;TCP/IP&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;193&lt;br /&gt;Teach yourself activex programming in 21 days&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;194&lt;br /&gt;Teach yourself C++ in 21 days&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;195&lt;br /&gt;Teach yourself C++ in 21 days&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;196&lt;br /&gt;Teach yourself CGI programming with Perl 5 in a week&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;197&lt;br /&gt;Teach yourself database programming with VB5 in 21 days, 2nd.ed.&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;198&lt;br /&gt;Teach yourself database programming with visual basic 5 in 21 days&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;199&lt;br /&gt;Teach yourself HTML 3.2 in 24 hours&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;200&lt;br /&gt;Teach yourself HTML 3.2 in 24 hours&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;201&lt;br /&gt;Teach yourself internet game programming with java in 21 days&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;202&lt;br /&gt;Teach yourself java 1.1 programming in 24 hours&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;203&lt;br /&gt;Teach yourself jave in café in 21 days&lt;br /&gt;http://www.parsian.net/set1252/pages/books.tm&lt;br /&gt;&lt;br /&gt;204&lt;br /&gt;Teach yourself Microsoft visual Interdev in 21 days&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;205&lt;br /&gt;Teach yourself Microsoft visual Interdev in 21 days&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;206&lt;br /&gt;Teach yourself oracle 8 in 21 days&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;207&lt;br /&gt;Teach yourself perl 5 in 21 days&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;208&lt;br /&gt;Teach yourself perl 5 in 21 days, 2nd.ed.&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;209&lt;br /&gt;Teach yourself SQL in 21 days&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;210&lt;br /&gt;Teach yourself SQL in 21 days, 2nd.ed.&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;211&lt;br /&gt;Teach yourself TCP/IP in 14 days&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;212&lt;br /&gt;Teach yourself TCP/IP in 14 days, 2nd.ed.&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;213&lt;br /&gt;Teach yourself the Internet in 24 hours&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;214&lt;br /&gt;Teach yourself the internet in 24 hours&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;215&lt;br /&gt;Teach yourself _VBScript in 21 days&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;216&lt;br /&gt;Teach yourself _VBScript in 21 days&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;217&lt;br /&gt;Teach yourself visual basic 5 in 24 hours&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;218&lt;br /&gt;Teach yourself Visual Basic 5 in 24 hours&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;219&lt;br /&gt;Teach yourself Visual J++ in 21 days&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;220&lt;br /&gt;Teach yourself web publishing with HTML 3.2 in 14 days&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;221&lt;br /&gt;Teach yourself web publishing with HTML in 14 days&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;222&lt;br /&gt;Thinking in C++&lt;br /&gt;http://www.mindview.net/Books&lt;br /&gt;&lt;br /&gt;223&lt;br /&gt;Thinking in C++/Eckel, Bruce - Vol.I, 2nd.ed.&lt;br /&gt;www.oopweb.com&lt;br /&gt;&lt;br /&gt;224&lt;br /&gt;Thinking in C++/Eckel, Bruce - Vol.II, 2nd.ed.&lt;br /&gt;www.oopweb.com&lt;br /&gt;&lt;br /&gt;225&lt;br /&gt;Thinking in Enterprise Java&lt;br /&gt;http://www.mindview.net/Books&lt;br /&gt;&lt;br /&gt;226&lt;br /&gt;Thinking in Java, 2nd.ed.&lt;br /&gt;www.oopweb.com&lt;br /&gt;&lt;br /&gt;227&lt;br /&gt;Thinking in Java, 3rd.ed. (pdf)&lt;br /&gt;http://www.mindview.net/Books&lt;br /&gt;&lt;br /&gt;228&lt;br /&gt;Tricks of the internet gurus&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;229&lt;br /&gt;Tricks of the java programming gurus&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;230&lt;br /&gt;Unix and internet security&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;231&lt;br /&gt;Unix hints and hacks/Waingrow, Kirk&lt;br /&gt;http://book.onairweb.net/computer/os/unix/Administration/UNIX_Hints_&amp;_Hacks/19270001..htm&lt;br /&gt;&lt;br /&gt;232&lt;br /&gt;Unix in a nutshell&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;233&lt;br /&gt;Unix kornshell quick reference&lt;br /&gt;http://book.onairweb.net/computer/os/shell/Unix_KornShell_Quick_Reference/kornShell.html&lt;br /&gt;&lt;br /&gt;234&lt;br /&gt;Unix power tools&lt;br /&gt;http://www.hk8.org/old_web/&lt;br /&gt;&lt;br /&gt;235&lt;br /&gt;Unix shell guide&lt;br /&gt;http://book.onairweb.net/computer/os/shell/The_UNIX_Shell_Guide/&lt;br /&gt;&lt;br /&gt;236&lt;br /&gt;Unix unleashed&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;237&lt;br /&gt;Unix unleashed&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;238&lt;br /&gt;Unix unleashed Internet Ed./Burk, Robin&lt;br /&gt;http://book.onairweb.net/computer/os/unix/Administration/UNIX_Unleashed(Internet_Edition)/fm.htm&lt;br /&gt;&lt;br /&gt;239&lt;br /&gt;Unix unleashed, System administrator&#39;s Edition&lt;br /&gt;http://book.onairweb.net/computer/os/unix/Administration/UNIX_Unleashed_System_Administrator&#39;s_Edition/toc.htm&lt;br /&gt;&lt;br /&gt;240&lt;br /&gt;Unix Unleashed/Sams Publication&lt;br /&gt;http://book.onairweb.net/computer/os/unix/Administration/UNIX_Unleashed/&lt;br /&gt;&lt;br /&gt;241&lt;br /&gt;Upgrading PCs illustrated&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;242&lt;br /&gt;Using windows NT workstation 4.0&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;243&lt;br /&gt;_VBScript unleashed&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;244&lt;br /&gt;_Vbscript unleashed&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;245&lt;br /&gt;Visual basic 4 in 12 easy lessons&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;246&lt;br /&gt;Visual basic 4 unleashed&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;247&lt;br /&gt;Visual Basic 5 night school&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;248&lt;br /&gt;Visual basic programming in 12 easy lessons&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;249&lt;br /&gt;Visual Basic programming in 12 easy lessons&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;250&lt;br /&gt;Visual C++ 4 unleashed&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;251&lt;br /&gt;Visual C++ programming in 12 easy lessons&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;252&lt;br /&gt;Web database developer&#39;s guide with visual basic 5&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm&lt;br /&gt;&lt;br /&gt;253&lt;br /&gt;Web database developer&#39;s guide with visual basic 5&lt;br /&gt;http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/&lt;br /&gt;&lt;br /&gt;254&lt;br /&gt;Web programming desktop reference 6-in-1&lt;br /&gt;http://www.parsian.net/set1252/pages/books.htm</content><link rel='replies' type='application/atom+xml' href='http://cyberztutorial.blogspot.com/feeds/1984674545429379850/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://cyberztutorial.blogspot.com/2009/03/250-tech-book-online.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3812921815264375231/posts/default/1984674545429379850'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3812921815264375231/posts/default/1984674545429379850'/><link rel='alternate' type='text/html' href='http://cyberztutorial.blogspot.com/2009/03/250-tech-book-online.html' title='250+ tech book online'/><author><name>THIEF</name><uri>http://www.blogger.com/profile/02562742835916644821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhW2nZSZ302EnOUf8zLgi7E2LmJa6LNLiwsnknKUF8ty4CI22DVk3BMp9_vL7ZZ_WkL12NChQuBhZx7RLaFhc6R1M1QJb7p3PEV4vKJ_iBg-PR_EXxe-06qXeTdv4rr6Q/s220/Image016.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3812921815264375231.post-6881611719166715545</id><published>2009-03-17T03:03:00.000-07:00</published><updated>2009-03-22T14:13:02.996-07:00</updated><title type='text'>36 Graphics designs and ebooks</title><content type='html'>36 Graphics &amp; Design Ebooks&lt;br /&gt;&lt;br /&gt;Maya, Photoshop, Macromedia, Bryce, Digital Photography, &amp; more....&lt;br /&gt;&lt;br /&gt;Download with FlashGet&lt;br /&gt;&lt;br /&gt;f*p://195.135.232.80/Books/design/8.books.Maya.[by.KiN_www.netz.ru].rar&lt;br /&gt;f*p://195.135.232.80/Books/design/A.Short.Course.in.Digital.Photography.[by.KiN_www.netz.ru].rar&lt;br /&gt;f*p://195.135.232.80/Books/design/Adobe.Creative.Suite.Keyboard.Shortcuts.[by.KiN_www.netz.ru]_3,1.MB.rar&lt;br /&gt;f*p://195.135.232.80/Books/design/Adobe.Photoshop.CS.in.10.Simple.Steps.or.Less.(2004).[by.KiN_www.netz.ru]_7,84 MB.rar&lt;br /&gt;f*p://195.135.232.80/Books/design/Adobe.Photoshop.Tutorial.7.Day.Course.html.a.[28.84.MB_www.netz.ru].rar&lt;br /&gt;f*p://195.135.232.80/Books/design/Advanced.3D.Photorealism.Techniques[9,76.MB_RUS_www.netz.ru].rar&lt;br /&gt;f*p://195.135.232.80/Books/design/Bill.Flemming.Advanced.3D.Photorealism.Techniques.[RUS].[by.KiN_www.netz.ru]_9,75 MB.rar&lt;br /&gt;f*p://195.135.232.80/Books/design/Bryce.5.Manual.[by.KiN_www.netz.ru_4.01MB].rar&lt;br /&gt;f*p://195.135.232.80/Books/design/Corel.103.tutorials.RUS.[by.KiN_www.netz.ru].rar&lt;br /&gt;f*p://195.135.232.80/Books/design/Designing Secure Web-Based Applications for Windows 2000.zip&lt;br /&gt;f*p://195.135.232.80/Books/design/DHTML.Weekend.Crash.Course[by.KiN_www.netz.ru].rar&lt;br /&gt;f*p://195.135.232.80/Books/design/Digital.Photography.Hacks.[by.KiN_www.netz.ru]_11,76.MB.rar&lt;br /&gt;f*p://195.135.232.80/Books/design/How.To.Do.Everything.With.Illustrator.[by.KiN_www.netz.ru]_30,58.MB.rar&lt;br /&gt;f*p://195.135.232.80/Books/design/How.To.Do.Everything.With.Photoshop.7.[by.KiN_www.netz.ru]_9,8 MB.rar&lt;br /&gt;f*p://195.135.232.80/Books/design/How.To.Draw.Anime.Photoshop.Coloring.Tips.[by.KiN_www.netz.ru]_773 kB.rar&lt;br /&gt;f*p://195.135.232.80/Books/design/How.To.Draw.Manga.Photoshop.Techniques.[by.KiN_www.netz.ru]_343 kB.rar&lt;br /&gt;f*p://195.135.232.80/Books/design/How.To.Use.Adobe.Photoshop.7.[by.KiN_www.netz.ru]_14,66 MB.rar&lt;br /&gt;f*p://195.135.232.80/Books/design/HTML.4.01.Weekend.Crash.Course[by.KiN_www.netz.ru].rar&lt;br /&gt;f*p://195.135.232.80/Books/design/HTML.Complete.Course.[by.KiN_www.netz.ru]_26,79.MB.rar&lt;br /&gt;f*p://195.135.232.80/Books/design/Learn.How.To.Draw.[by.KiN_www.netz.ru]_1,61.MB.rar&lt;br /&gt;f*p://195.135.232.80/Books/design/Learn.HTML4.In.a.Weekend.[by.KiN_www.netz.ru]_11,02.MB.rar&lt;br /&gt;f*p://195.135.232.80/Books/design/Learning.Macromedia.FlashMX.2004[658.kB_www.netz.ru].rar&lt;br /&gt;f*p://195.135.232.80/Books/design/Macromedia.Dreamweaver.4.Bible[8,86.MB_www.netz.ru].rar&lt;br /&gt;f*p://195.135.232.80/Books/design/Macromedia.Dreamweaver.MX.2004.Web.Application.Recipes[6,5.MB_www.netz.ru].rar&lt;br /&gt;f*p://195.135.232.80/Books/design/Macromedia.Flash.MX.2004.ActionScript.Reference.Guide.rar&lt;br /&gt;f*p://195.135.232.80/Books/design/Macromedia.Flash.MX.2004.Using.Components.rar&lt;br /&gt;f*p://195.135.232.80/Books/design/Macromedia.Flashmx.Actionscript.Reference.Guide.2004[2,66.MB_www.netz.ru].rar&lt;br /&gt;f*p://195.135.232.80/Books/design/Macromedia.Flashmx.Using.Components.2004[979.kB_www.netz.ru].rar&lt;br /&gt;f*p://195.135.232.80/Books/design/Macromedia.Press.Macromedia.Dreamweaver.MX.Dynamic.Applications.[10.46.MB_www.netz.ru].rar&lt;br /&gt;f*p://195.135.232.80/Books/design/New.Riders.Photoshop.7.Power.Shortcuts.[by.KiN_www.netz.ru]_3,5 MB.rar&lt;br /&gt;f*p://195.135.232.80/Books/design/NewRiders.MacromediaDreamweaverMx2004WebApplicationRecipes(6,5MB_www.netz.ru).rar f*p://195.135.232.80/Books/design/PhotoShop.&amp;.Illustrator.Tutorial.[14.37.MB_www.netz.ru].rar&lt;br /&gt;f*p://195.135.232.80/Books/design/Photoshop.6.Bible.[13.95.MB_www.netz.ru].rar f*p://195.135.232.80/Books/design/Photoshop.75.tutorial.RUS.[by.KiN_www.netz.ru].rar&lt;br /&gt;f*p://195.135.232.80/Books/design/Photoshop.CS.Tips.and.Tricks.[by.KiN_www.netz.ru].rar&lt;br /&gt;f*p://195.135.232.80/Books/design/Photoshop.Rus.4-18[6.5Mb,_www.netz.ru].rar</content><link rel='replies' type='application/atom+xml' href='http://cyberztutorial.blogspot.com/feeds/6881611719166715545/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://cyberztutorial.blogspot.com/2009/03/36-graphics-designs-and-ebooks.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3812921815264375231/posts/default/6881611719166715545'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3812921815264375231/posts/default/6881611719166715545'/><link rel='alternate' type='text/html' href='http://cyberztutorial.blogspot.com/2009/03/36-graphics-designs-and-ebooks.html' title='36 Graphics designs and ebooks'/><author><name>THIEF</name><uri>http://www.blogger.com/profile/02562742835916644821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhW2nZSZ302EnOUf8zLgi7E2LmJa6LNLiwsnknKUF8ty4CI22DVk3BMp9_vL7ZZ_WkL12NChQuBhZx7RLaFhc6R1M1QJb7p3PEV4vKJ_iBg-PR_EXxe-06qXeTdv4rr6Q/s220/Image016.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3812921815264375231.post-4171080692233075591</id><published>2009-03-17T03:02:00.000-07:00</published><updated>2009-03-22T14:13:03.013-07:00</updated><title type='text'>23 Ways to speed up the pc xp</title><content type='html'>Since defragging the disk won&#39;t do much to improve Windows XP performance, here are 23 suggestions that will. Each can enhance the performance and reliability of your customers&#39; PCs. Best of all, most of them will cost you nothing.&lt;br /&gt;1.) To decrease a system&#39;s boot time and increase system performance, use the money you save by not buying defragmentation software -- the built-in Windows defragmenter works just fine -- and instead equip the computer with an Ultra-133 or Serial ATA hard drive with 8-MB cache buffer.&lt;br /&gt;&lt;br /&gt;2.) If a PC has less than 512 MB of RAM, add more memory. This is a relatively inexpensive and easy upgrade that can dramatically improve system performance.&lt;br /&gt;&lt;br /&gt;3.) Ensure that Windows XP is utilizing the NTFS file system. If you&#39;re not sure, here&#39;s how to check: First, double-click the My Computer icon, right-click on the C: Drive, then select Properties. Next, examine the File System type; if it says FAT32, then back-up any important data. Next, click Start, click Run, type CMD, and then click OK. At the prompt, type CONVERT C: /FS:NTFS and press the Enter key. This process may take a while; it&#39;s important that the computer be uninterrupted and virus-free. The file system used by the bootable drive will be either FAT32 or NTFS. I highly recommend NTFS for its superior security, reliability, and efficiency with larger disk drives.&lt;br /&gt;&lt;br /&gt;4.) Disable file indexing. The indexing service extracts information from documents and other files on the hard drive and creates a &quot;searchable keyword index.&quot; As you can imagine, this process can be quite taxing on any system.&lt;br /&gt;&lt;br /&gt;The idea is that the user can search for a word, phrase, or property inside a document, should they have hundreds or thousands of documents and not know the file name of the document they want. Windows XP&#39;s built-in search functionality can still perform these kinds of searches without the Indexing service. It just takes longer. The OS has to open each file at the time of the request to help find what the user is looking for.&lt;br /&gt;&lt;br /&gt;Most people never need this feature of search. Those who do are typically in a large corporate environment where thousands of documents are located on at least one server. But if you&#39;re a typical system builder, most of your clients are small and medium businesses. And if your clients have no need for this search feature, I recommend disabling it.&lt;br /&gt;&lt;br /&gt;Here&#39;s how: First, double-click the My Computer icon. Next, right-click on the C: Drive, then select Properties. Uncheck &quot;Allow Indexing Service to index this disk for fast file searching.&quot; Next, apply changes to &quot;C: subfolders and files,&quot; and click OK. If a warning or error message appears (such as &quot;Access is denied&quot;), click the Ignore All button.&lt;br /&gt;&lt;br /&gt;5.) Update the PC&#39;s video and motherboard chipset drivers. Also, update and configure the BIOS. For more information on how to configure your BIOS properly, see this article on my site.&lt;br /&gt;&lt;br /&gt;6.) Empty the Windows Prefetch folder every three months or so. Windows XP can &quot;prefetch&quot; portions of data and applications that are used frequently. This makes processes appear to load faster when called upon by the user. That&#39;s fine. But over time, the prefetch folder may become overloaded with references to files and applications no longer in use. When that happens, Windows XP is wasting time, and slowing system performance, by pre-loading them. Nothing critical is in this folder, and the entire contents are safe to delete.&lt;br /&gt;&lt;br /&gt;7.) Once a month, run a disk cleanup. Here&#39;s how: Double-click the My Computer icon. Then right-click on the C: drive and select Properties. Click the Disk Cleanup button -- it&#39;s just to the right of the Capacity pie graph -- and delete all temporary files.&lt;br /&gt;&lt;br /&gt;8.) In your Device Manager, double-click on the IDE ATA/ATAPI Controllers device, and ensure that DMA is enabled for each drive you have connected to the Primary and Secondary controller. Do this by double-clicking on Primary IDE Channel. Then click the Advanced Settings tab. Ensure the Transfer Mode is set to &quot;DMA if available&quot; for both Device 0 and Device 1. Then repeat this process with the Secondary IDE Channel.&lt;br /&gt;&lt;br /&gt;9.) Upgrade the cabling. As hard-drive technology improves, the cabling requirements to achieve these performance boosts have become more stringent. Be sure to use 80-wire Ultra-133 cables on all of your IDE devices with the connectors properly assigned to the matching Master/Slave/Motherboard sockets. A single device must be at the end of the cable; connecting a single drive to the middle connector on a ribbon cable will cause signaling problems. With Ultra DMA hard drives, these signaling problems will prevent the drive from performing at its maximum potential. Also, because these cables inherently support &quot;cable select,&quot; the location of each drive on the cable is important. For these reasons, the cable is designed so drive positioning is explicitly clear.&lt;br /&gt;&lt;br /&gt;10.) Remove all spyware from the computer. Use free programs such as AdAware by Lavasoft or SpyBot Search &amp; Destroy. Once these programs are installed, be sure to check for and download any updates before starting your search. Anything either program finds can be safely removed. Any free software that requires spyware to run will no longer function once the spyware portion has been removed; if your customer really wants the program even though it contains spyware, simply reinstall it. For more information on removing Spyware visit this Web Pro News page.&lt;br /&gt;&lt;br /&gt;11.) Remove any unnecessary programs and/or items from Windows Startup routine using the MSCONFIG utility. Here&#39;s how: First, click Start, click Run, type MSCONFIG, and click OK. Click the StartUp tab, then uncheck any items you don&#39;t want to start when Windows starts. Unsure what some items are? Visit the WinTasks Process Library. It contains known system processes, applications, as well as spyware references and explanations. Or quickly identify them by searching for the filenames using Google or another Web search engine.&lt;br /&gt;&lt;br /&gt;12.) Remove any unnecessary or unused programs from the Add/Remove Programs section of the Control Panel.&lt;br /&gt;&lt;br /&gt;13.) Turn off any and all unnecessary animations, and disable active desktop. In fact, for optimal performance, turn off all animations. Windows XP offers many different settings in this area. Here&#39;s how to do it: First click on the System icon in the Control Panel. Next, click on the Advanced tab. Select the Settings button located under Performance. Feel free to play around with the options offered here, as nothing you can change will alter the reliability of the computer -- only its responsiveness.&lt;br /&gt;&lt;br /&gt;14.) If your customer is an advanced user who is comfortable editing their registry, try some of the performance registry tweaks offered at Tweak XP.&lt;br /&gt;&lt;br /&gt;15.) Visit Microsoft&#39;s Windows update site regularly, and download all updates labeled Critical. Download any optional updates at your discretion.&lt;br /&gt;&lt;br /&gt;16.) Update the customer&#39;s anti-virus software on a weekly, even daily, basis. Make sure they have only one anti-virus software package installed. Mixing anti-virus software is a sure way to spell disaster for performance and reliability.&lt;br /&gt;&lt;br /&gt;17.) Make sure the customer has fewer than 500 type fonts installed on their computer. The more fonts they have, the slower the system will become. While Windows XP handles fonts much more efficiently than did the previous versions of Windows, too many fonts -- that is, anything over 500 -- will noticeably tax the system.&lt;br /&gt;&lt;br /&gt;18.) Do not partition the hard drive. Windows XP&#39;s NTFS file system runs more efficiently on one large partition. The data is no safer on a separate partition, and a reformat is never necessary to reinstall an operating system. The same excuses people offer for using partitions apply to using a folder instead. For example, instead of putting all your data on the D: drive, put it in a folder called &quot;D drive.&quot; You&#39;ll achieve the same organizational benefits that a separate partition offers, but without the degradation in system performance. Also, your free space won&#39;t be limited by the size of the partition; instead, it will be limited by the size of the entire hard drive. This means you won&#39;t need to resize any partitions, ever. That task can be time-consuming and also can result in lost data.&lt;br /&gt;&lt;br /&gt;19.) Check the system&#39;s RAM to ensure it is operating properly. I recommend using a free program called MemTest86. The download will make a bootable CD or diskette (your choice), which will run 10 extensive tests on the PC&#39;s memory automatically after you boot to the disk you created. Allow all tests to run until at least three passes of the 10 tests are completed. If the program encounters any errors, turn off and unplug the computer, remove a stick of memory (assuming you have more than one), and run the test again. Remember, bad memory cannot be repaired, but only replaced.&lt;br /&gt;&lt;br /&gt;20.) If the PC has a CD or DVD recorder, check the drive manufacturer&#39;s Web site for updated firmware. In some cases you&#39;ll be able to upgrade the recorder to a faster speed. Best of all, it&#39;s free.&lt;br /&gt;&lt;br /&gt;21.) Disable unnecessary services. Windows XP loads a lot of services that your customer most likely does not need. To determine which services you can disable for your client, visit the Black Viper site for Windows XP configurations.&lt;br /&gt;&lt;br /&gt;22.) If you&#39;re sick of a single Windows Explorer window crashing and then taking the rest of your OS down with it, then follow this tip: open My Computer, click on Tools, then Folder Options. Now click on the View tab. Scroll down to &quot;Launch folder windows in a separate process,&quot; and enable this option. You&#39;ll have to reboot your machine for this option to take effect.&lt;br /&gt;&lt;br /&gt;23.) At least once a year, open the computer&#39;s cases and blow out all the dust and debris. While you&#39;re in there, check that all the fans are turning properly. Also inspect the motherboard capacitors for bulging or leaks. For more information on this leaking-capacitor phenomena, you can read numerous articles on my site.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Following any of these suggestions should result in noticeable improvements to the performance and reliability of your customers&#39; computers. If you still want to defrag a disk, remember that the main benefit will be to make your data more retrievable in the event of a crashed drive.</content><link rel='replies' type='application/atom+xml' href='http://cyberztutorial.blogspot.com/feeds/4171080692233075591/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://cyberztutorial.blogspot.com/2009/03/23-ways-to-speed-up-pc-xp.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3812921815264375231/posts/default/4171080692233075591'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3812921815264375231/posts/default/4171080692233075591'/><link rel='alternate' type='text/html' href='http://cyberztutorial.blogspot.com/2009/03/23-ways-to-speed-up-pc-xp.html' title='23 Ways to speed up the pc xp'/><author><name>THIEF</name><uri>http://www.blogger.com/profile/02562742835916644821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhW2nZSZ302EnOUf8zLgi7E2LmJa6LNLiwsnknKUF8ty4CI22DVk3BMp9_vL7ZZ_WkL12NChQuBhZx7RLaFhc6R1M1QJb7p3PEV4vKJ_iBg-PR_EXxe-06qXeTdv4rr6Q/s220/Image016.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3812921815264375231.post-8751253429660496683</id><published>2009-03-17T03:00:00.000-07:00</published><updated>2009-03-22T14:13:03.037-07:00</updated><title type='text'>20 Great google secrets</title><content type='html'>20 Great Google Secrets&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;http://www.pcmag.com/article2/0,4149,1306756,00.asp&lt;br /&gt;&lt;br /&gt;excl.gif No Active Links, Read the Rules - Edit by Ninja excl.gif&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Google is clearly the best general-purpose search engine on the Web (see&lt;br /&gt;&lt;br /&gt;www.pcmag.com/searchengines&lt;br /&gt;&lt;br /&gt;But most people don&#39;t use it to its best advantage. Do you just plug in a keyword or two and hope for the best? That may be the quickest way to search, but with more than 3 billion pages in Google&#39;s index, it&#39;s still a struggle to pare results to a manageable number.&lt;br /&gt;&lt;br /&gt;But Google is an remarkably powerful tool that can ease and enhance your Internet exploration. Google&#39;s search options go beyond simple keywords, the Web, and even its own programmers. Let&#39;s look at some of Google&#39;s lesser-known options.&lt;br /&gt;&lt;br /&gt;Syntax Search Tricks&lt;br /&gt;&lt;br /&gt;Using a special syntax is a way to tell Google that you want to restrict your searches to certain elements or characteristics of Web pages. Google has a fairly complete list of its syntax elements at&lt;br /&gt;&lt;br /&gt;www.google.com/help/operators.html&lt;br /&gt;&lt;br /&gt;. Here are some advanced operators that can help narrow down your search results.&lt;br /&gt;&lt;br /&gt;Intitle: at the beginning of a query word or phrase (intitle:&quot;Three Blind Mice&quot;) restricts your search results to just the titles of Web pages.&lt;br /&gt;&lt;br /&gt;Intext: does the opposite of intitle:, searching only the body text, ignoring titles, links, and so forth. Intext: is perfect when what you&#39;re searching for might commonly appear in URLs. If you&#39;re looking for the term HTML, for example, and you don&#39;t want to get results such as&lt;br /&gt;&lt;br /&gt;www.mysite.com/index.html&lt;br /&gt;&lt;br /&gt;, you can enter intext:html.&lt;br /&gt;&lt;br /&gt;Link: lets you see which pages are linking to your Web page or to another page you&#39;re interested in. For example, try typing in&lt;br /&gt;&lt;br /&gt;link:http://www.pcmag.com&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Try using site: (which restricts results to top-level domains) with intitle: to find certain types of pages. For example, get scholarly pages about Mark Twain by searching for intitle:&quot;Mark Twain&quot;site:edu. Experiment with mixing various elements; you&#39;ll develop several strategies for finding the stuff you want more effectively. The site: command is very helpful as an alternative to the mediocre search engines built into many sites.&lt;br /&gt;&lt;br /&gt;Swiss Army Google&lt;br /&gt;&lt;br /&gt;Google has a number of services that can help you accomplish tasks you may never have thought to use Google for. For example, the new calculator feature&lt;br /&gt;&lt;br /&gt;(www.google.com/help/features.html#calculator)&lt;br /&gt;&lt;br /&gt;lets you do both math and a variety of conversions from the search box. For extra fun, try the query &quot;Answer to life the universe and everything.&quot;&lt;br /&gt;&lt;br /&gt;Let Google help you figure out whether you&#39;ve got the right spelling—and the right word—for your search. Enter a misspelled word or phrase into the query box (try &quot;thre blund mise&quot;) and Google may suggest a proper spelling. This doesn&#39;t always succeed; it works best when the word you&#39;re searching for can be found in a dictionary. Once you search for a properly spelled word, look at the results page, which repeats your query. (If you&#39;re searching for &quot;three blind mice,&quot; underneath the search window will appear a statement such as Searched the web for &quot;three blind mice.&quot;) You&#39;ll discover that you can click on each word in your search phrase and get a definition from a dictionary.&lt;br /&gt;&lt;br /&gt;Suppose you want to contact someone and don&#39;t have his phone number handy. Google can help you with that, too. Just enter a name, city, and state. (The city is optional, but you must enter a state.) If a phone number matches the listing, you&#39;ll see it at the top of the search results along with a map link to the address. If you&#39;d rather restrict your results, use rphonebook: for residential listings or bphonebook: for business listings. If you&#39;d rather use a search form for business phone listings, try Yellow Search&lt;br /&gt;&lt;br /&gt;(www.buzztoolbox.com/google/yellowsearch.shtml).&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Extended Googling&lt;br /&gt;&lt;br /&gt;Google offers several services that give you a head start in focusing your search. Google Groups&lt;br /&gt;&lt;br /&gt;(http://groups.google.com)&lt;br /&gt;&lt;br /&gt;indexes literally millions of messages from decades of discussion on Usenet. Google even helps you with your shopping via two tools: Froogle&lt;br /&gt;CODE&lt;br /&gt;(http://froogle.google.com),&lt;br /&gt;&lt;br /&gt;which indexes products from online stores, and Google Catalogs&lt;br /&gt;CODE&lt;br /&gt;(http://catalogs.google.com),&lt;br /&gt;&lt;br /&gt;which features products from more 6,000 paper catalogs in a searchable index. And this only scratches the surface. You can get a complete list of Google&#39;s tools and services at&lt;br /&gt;&lt;br /&gt;www.google.com/options/index.html&lt;br /&gt;&lt;br /&gt;You&#39;re probably used to using Google in your browser. But have you ever thought of using Google outside your browser?&lt;br /&gt;&lt;br /&gt;Google Alert&lt;br /&gt;&lt;br /&gt;(www.googlealert.com)&lt;br /&gt;&lt;br /&gt;monitors your search terms and e-mails you information about new additions to Google&#39;s Web index. (Google Alert is not affiliated with Google; it uses Google&#39;s Web services API to perform its searches.) If you&#39;re more interested in news stories than general Web content, check out the beta version of Google News Alerts&lt;br /&gt;&lt;br /&gt;(www.google.com/newsalerts).&lt;br /&gt;&lt;br /&gt;This service (which is affiliated with Google) will monitor up to 50 news queries per e-mail address and send you information about news stories that match your query. (Hint: Use the intitle: and source: syntax elements with Google News to limit the number of alerts you get.)&lt;br /&gt;&lt;br /&gt;Google on the telephone? Yup. This service is brought to you by the folks at Google Labs&lt;br /&gt;&lt;br /&gt;(http://labs.google.com),&lt;br /&gt;&lt;br /&gt;a place for experimental Google ideas and features (which may come and go, so what&#39;s there at this writing might not be there when you decide to check it out). With Google Voice Search&lt;br /&gt;&lt;br /&gt;(http://labs1.google.com/gvs.html),&lt;br /&gt;&lt;br /&gt;you dial the Voice Search phone number, speak your keywords, and then click on the indicated link. Every time you say a new search term, the results page will refresh with your new query (you must have JavaScript enabled for this to work). Remember, this service is still in an experimental phase, so don&#39;t expect 100 percent success.&lt;br /&gt;&lt;br /&gt;In 2002, Google released the Google API (application programming interface), a way for programmers to access Google&#39;s search engine results without violating the Google Terms of Service. A lot of people have created useful (and occasionally not-so-useful but interesting) applications not available from Google itself, such as Google Alert. For many applications, you&#39;ll need an API key, which is available free from&lt;br /&gt;CODE&lt;br /&gt;www.google.com/apis&lt;br /&gt;&lt;br /&gt;. See the figures for two more examples, and visit&lt;br /&gt;&lt;br /&gt;www.pcmag.com/solutions&lt;br /&gt;&lt;br /&gt;for more.&lt;br /&gt;&lt;br /&gt;Thanks to its many different search properties, Google goes far beyond a regular search engine. Give the tricks in this article a try. You&#39;ll be amazed at how many different ways Google can improve your Internet searching.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Online Extra: More Google Tips&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Here are a few more clever ways to tweak your Google searches.&lt;br /&gt;&lt;br /&gt;Search Within a Timeframe&lt;br /&gt;&lt;br /&gt;Daterange: (start date–end date). You can restrict your searches to pages that were indexed within a certain time period. Daterange: searches by when Google indexed a page, not when the page itself was created. This operator can help you ensure that results will have fresh content (by using recent dates), or you can use it to avoid a topic&#39;s current-news blizzard and concentrate only on older results. Daterange: is actually more useful if you go elsewhere to take advantage of it, because daterange: requires Julian dates, not standard Gregorian dates. You can find converters on the Web (such as&lt;br /&gt;&lt;br /&gt;CODE&lt;br /&gt;http://aa.usno.navy.mil/data/docs/JulianDate.html&lt;br /&gt;&lt;br /&gt;excl.gif No Active Links, Read the Rules - Edit by Ninja excl.gif&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;), but an easier way is to do a Google daterange: search by filling in a form at&lt;br /&gt;&lt;br /&gt;www.researchbuzz.com/toolbox/goofresh.shtml or www.faganfinder.com/engines/google.shtml&lt;br /&gt;&lt;br /&gt;. If one special syntax element is good, two must be better, right? Sometimes. Though some operators can&#39;t be mixed (you can&#39;t use the link: operator with anything else) many can be, quickly narrowing your results to a less overwhelming number.&lt;br /&gt;&lt;br /&gt;More Google API Applications&lt;br /&gt;&lt;br /&gt;Staggernation.com offers three tools based on the Google API. The Google API Web Search by Host (GAWSH) lists the Web hosts of the results for a given query&lt;br /&gt;&lt;br /&gt;(www.staggernation.com/gawsh/).&lt;br /&gt;&lt;br /&gt;When you click on the triangle next to each host, you get a list of results for that host. The Google API Relation Browsing Outliner (GARBO) is a little more complicated: You enter a URL and choose whether you want pages that related to the URL or linked to the URL&lt;br /&gt;&lt;br /&gt;(www.staggernation.com/garbo/).&lt;br /&gt;&lt;br /&gt;Click on the triangle next to an URL to get a list of pages linked or related to that particular URL. CapeMail is an e-mail search application that allows you to send an e-mail to google@capeclear.com with the text of your query in the subject line and get the first ten results for that query back. Maybe it&#39;s not something you&#39;d do every day, but if your cell phone does e-mail and doesn&#39;t do Web browsing, this is a very handy address to know.</content><link rel='replies' type='application/atom+xml' href='http://cyberztutorial.blogspot.com/feeds/8751253429660496683/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://cyberztutorial.blogspot.com/2009/03/20-great-google-secrets.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3812921815264375231/posts/default/8751253429660496683'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3812921815264375231/posts/default/8751253429660496683'/><link rel='alternate' type='text/html' href='http://cyberztutorial.blogspot.com/2009/03/20-great-google-secrets.html' title='20 Great google secrets'/><author><name>THIEF</name><uri>http://www.blogger.com/profile/02562742835916644821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhW2nZSZ302EnOUf8zLgi7E2LmJa6LNLiwsnknKUF8ty4CI22DVk3BMp9_vL7ZZ_WkL12NChQuBhZx7RLaFhc6R1M1QJb7p3PEV4vKJ_iBg-PR_EXxe-06qXeTdv4rr6Q/s220/Image016.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3812921815264375231.post-938229950063695984</id><published>2009-03-17T02:59:00.000-07:00</published><updated>2009-03-22T14:13:03.059-07:00</updated><title type='text'>10 Best security enhancements for your pc</title><content type='html'>10 Fast and Free Security Enhancements &lt;br /&gt;PC magazine.&lt;br /&gt;&lt;br /&gt;Before you spend a dime on security, there are many precautions you can take that will protect you against the most common threats.&lt;br /&gt;&lt;br /&gt;1. Check Windows Update and Office Update regularly (_http://office.microsoft.com/productupdates); have your Office CD ready. Windows Me, 2000, and XP users can configure automatic updates. Click on the Automatic Updates tab in the System control panel and choose the appropriate options.&lt;br /&gt;&lt;br /&gt;2. Install a personal firewall. Both SyGate (_www.sygate.com) and ZoneAlarm (_www.zonelabs.com) offer free versions.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;3. Install a free spyware blocker. Our Editors&#39; Choice (&quot;Spyware,&quot; April 22) was SpyBot Search &amp; Destroy (_http://security.kolla.de). SpyBot is also paranoid and ruthless in hunting out tracking cookies.&lt;br /&gt;&lt;br /&gt;4. Block pop-up spam messages in Windows NT, 2000, or XP by disabling the Windows Messenger service (this is unrelated to the instant messaging program). Open Control Panel | Administrative Tools | Services and you&#39;ll see Messenger. Right-click and go to Properties. Set Start-up Type to Disabled and press the Stop button. Bye-bye, spam pop-ups! Any good firewall will also stop them.&lt;br /&gt;&lt;br /&gt;5. Use strong passwords and change them periodically. Passwords should have at least seven characters; use letters and numbers and have at least one symbol. A decent example would be f8izKro@l. This will make it much harder for anyone to gain access to your accounts.&lt;br /&gt;&lt;br /&gt;6. If you&#39;re using Outlook or Outlook Express, use the current version or one with the Outlook Security Update installed. The update and current versions patch numerous vulnerabilities.&lt;br /&gt;&lt;br /&gt;7. Buy antivirus software and keep it up to date. If you&#39;re not willing to pay, try Grisoft AVG Free Edition (Grisoft Inc., w*w.grisoft.com). And doublecheck your AV with the free, online-only scanners available at w*w.pandasoftware.com/activescan and _http://housecall.trendmicro.com.&lt;br /&gt;&lt;br /&gt;8. If you have a wireless network, turn on the security features: Use MAC filtering, turn off SSID broadcast, and even use WEP with the biggest key you can get. For more, check out our wireless section or see the expanded coverage in Your Unwired World in our next issue.&lt;br /&gt;&lt;br /&gt;9. Join a respectable e-mail security list, such as the one found at our own Security Supersite at _http://security.ziffdavis.com, so that you learn about emerging threats quickly and can take proper precautions.&lt;br /&gt;&lt;br /&gt;10. Be skeptical of things on the Internet. Don&#39;t assume that e-mail &quot;From:&quot; a particular person is actually from that person until you have further reason to believe it&#39;s that person. Don&#39;t assume that an attachment is what it says it is. Don&#39;t give out your password to anyone, even if that person claims to be from &quot;support.&quot;</content><link rel='replies' type='application/atom+xml' href='http://cyberztutorial.blogspot.com/feeds/938229950063695984/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://cyberztutorial.blogspot.com/2009/03/10-best-security-enhancements-for-your.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3812921815264375231/posts/default/938229950063695984'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3812921815264375231/posts/default/938229950063695984'/><link rel='alternate' type='text/html' href='http://cyberztutorial.blogspot.com/2009/03/10-best-security-enhancements-for-your.html' title='10 Best security enhancements for your pc'/><author><name>THIEF</name><uri>http://www.blogger.com/profile/02562742835916644821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhW2nZSZ302EnOUf8zLgi7E2LmJa6LNLiwsnknKUF8ty4CI22DVk3BMp9_vL7ZZ_WkL12NChQuBhZx7RLaFhc6R1M1QJb7p3PEV4vKJ_iBg-PR_EXxe-06qXeTdv4rr6Q/s220/Image016.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3812921815264375231.post-3991160323322616121</id><published>2009-03-17T02:44:00.000-07:00</published><updated>2009-03-22T14:13:03.076-07:00</updated><title type='text'>10 Reasons why PC crushes u must know</title><content type='html'>10 reasons why PCs crash U must Know&lt;br /&gt;&lt;br /&gt;Fatal error: the system has become unstable or is busy,&quot; it says. &quot;Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications.&quot;&lt;br /&gt;&lt;br /&gt;You have just been struck by the Blue Screen of Death. Anyone who uses Mcft Windows will be familiar with this. What can you do? More importantly, how can you prevent it happening?&lt;br /&gt;&lt;br /&gt;1 Hardware conflict&lt;br /&gt;&lt;br /&gt;The number one reason why Windows crashes is hardware conflict. Each hardware device communicates to other devices through an interrupt request channel (IRQ). These are supposed to be unique for each device.&lt;br /&gt;&lt;br /&gt;For example, a printer usually connects internally on IRQ 7. The keyboard usually uses IRQ 1 and the floppy disk drive IRQ 6. Each device will try to hog a single IRQ for itself.&lt;br /&gt;&lt;br /&gt;If there are a lot of devices, or if they are not installed properly, two of them may end up sharing the same IRQ number. When the user tries to use both devices at the same time, a crash can happen. The way to check if your computer has a hardware conflict is through the following route:&lt;br /&gt;&lt;br /&gt;* Start-Settings-Control Panel-System-Device Manager.&lt;br /&gt;&lt;br /&gt;Often if a device has a problem a yellow &#39;!&#39; appears next to its description in the Device Manager. Highlight Computer (in the Device Manager) and press Properties to see the IRQ numbers used by your computer. If the IRQ number appears twice, two devices may be using it.&lt;br /&gt;&lt;br /&gt;Sometimes a device might share an IRQ with something described as &#39;IRQ holder for PCI steering&#39;. This can be ignored. The best way to fix this problem is to remove the problem device and reinstall it.&lt;br /&gt;&lt;br /&gt;Sometimes you may have to find more recent drivers on the internet to make the device function properly. A good resource is www.driverguide.com. If the device is a soundcard, or a modem, it can often be fixed by moving it to a different slot on the motherboard (be careful about opening your computer, as you may void the warranty).&lt;br /&gt;&lt;br /&gt;When working inside a computer you should switch it off, unplug the mains lead and touch an unpainted metal surface to discharge any static electricity.&lt;br /&gt;&lt;br /&gt;To be fair to Mcft, the problem with IRQ numbers is not of its making. It is a legacy problem going back to the first PC designs using the IBM 8086 chip. Initially there were only eight IRQs. Today there are 16 IRQs in a PC. It is easy to run out of them. There are plans to increase the number of IRQs in future designs.&lt;br /&gt;&lt;br /&gt;2 Bad Ram&lt;br /&gt;&lt;br /&gt;Ram (random-access memory) problems might bring on the blue screen of death with a message saying Fatal Exception Error. A fatal error indicates a serious hardware problem. Sometimes it may mean a part is damaged and will need replacing.&lt;br /&gt;&lt;br /&gt;But a fatal error caused by Ram might be caused by a mismatch of chips. For example, mixing 70-nanosecond (70ns) Ram with 60ns Ram will usually force the computer to run all the Ram at the slower speed. This will often crash the machine if the Ram is overworked.&lt;br /&gt;&lt;br /&gt;One way around this problem is to enter the BIOS settings and increase the wait state of the Ram. This can make it more stable. Another way to troubleshoot a suspected Ram problem is to rearrange the Ram chips on the motherboard, or take some of them out. Then try to repeat the circumstances that caused the crash. When handling Ram try not to touch the gold connections, as they can be easily damaged.&lt;br /&gt;&lt;br /&gt;Parity error messages also refer to Ram. Modern Ram chips are either parity (ECC) or non parity (non-ECC). It is best not to mix the two types, as this can be a cause of trouble.&lt;br /&gt;&lt;br /&gt;EMM386 error messages refer to memory problems but may not be connected to bad Ram. This may be due to free memory problems often linked to old Dos-based programmes.&lt;br /&gt;&lt;br /&gt;3 BIOS settings&lt;br /&gt;&lt;br /&gt;Every motherboard is supplied with a range of chipset settings that are decided in the factory. A common way to access these settings is to press the F2 or delete button during the first few seconds of a boot-up.&lt;br /&gt;&lt;br /&gt;Once inside the BIOS, great care should be taken. It is a good idea to write down on a piece of paper all the settings that appear on the screen. That way, if you change something and the computer becomes more unstable, you will know what settings to revert to.&lt;br /&gt;&lt;br /&gt;A common BIOS error concerns the CAS latency. This refers to the Ram. Older EDO (extended data out) Ram has a CAS latency of 3. Newer SDRam has a CAS latency of 2. Setting the wrong figure can cause the Ram to lock up and freeze the computer&#39;s display.&lt;br /&gt;&lt;br /&gt;Mcft Windows is better at allocating IRQ numbers than any BIOS. If possible set the IRQ numbers to Auto in the BIOS. This will allow Windows to allocate the IRQ numbers (make sure the BIOS setting for Plug and Play OS is switched to &#39;yes&#39; to allow Windows to do this.).&lt;br /&gt;&lt;br /&gt;4 Hard disk drives&lt;br /&gt;&lt;br /&gt;After a few weeks, the information on a hard disk drive starts to become piecemeal or fragmented. It is a good idea to defragment the hard disk every week or so, to prevent the disk from causing a screen freeze. Go to&lt;br /&gt;&lt;br /&gt;* Start-Programs-Accessories-System Tools-Disk Defragmenter&lt;br /&gt;&lt;br /&gt;This will start the procedure. You will be unable to write data to the hard drive (to save it) while the disk is defragmenting, so it is a good idea to schedule the procedure for a period of inactivity using the Task Scheduler.&lt;br /&gt;&lt;br /&gt;The Task Scheduler should be one of the small icons on the bottom right of the Windows opening page (the desktop).&lt;br /&gt;&lt;br /&gt;Some lockups and screen freezes caused by hard disk problems can be solved by reducing the read-ahead optimisation. This can be adjusted by going to&lt;br /&gt;&lt;br /&gt;* Start-Settings-Control Panel-System Icon-Performance-File System-Hard Disk.&lt;br /&gt;&lt;br /&gt;Hard disks will slow down and crash if they are too full. Do some housekeeping on your hard drive every few months and free some space on it. Open the Windows folder on the C drive and find the Temporary Internet Files folder. Deleting the contents (not the folder) can free a lot of space.&lt;br /&gt;&lt;br /&gt;Empty the Recycle Bin every week to free more space. Hard disk drives should be scanned every week for errors or bad sectors. Go to&lt;br /&gt;&lt;br /&gt;* Start-Programs-Accessories-System Tools-ScanDisk&lt;br /&gt;&lt;br /&gt;Otherwise assign the Task Scheduler to perform this operation at night when the computer is not in use.&lt;br /&gt;&lt;br /&gt;5 Fatal OE exceptions and VXD errors&lt;br /&gt;&lt;br /&gt;Fatal OE exception errors and VXD errors are often caused by video card problems.&lt;br /&gt;&lt;br /&gt;These can often be resolved easily by reducing the resolution of the video display. Go to&lt;br /&gt;&lt;br /&gt;* Start-Settings-Control Panel-Display-Settings&lt;br /&gt;&lt;br /&gt;Here you should slide the screen area bar to the left. Take a look at the colour settings on the left of that window. For most desktops, high colour 16-bit depth is adequate.&lt;br /&gt;&lt;br /&gt;If the screen freezes or you experience system lockups it might be due to the video card. Make sure it does not have a hardware conflict. Go to&lt;br /&gt;&lt;br /&gt;* Start-Settings-Control Panel-System-Device Manager&lt;br /&gt;&lt;br /&gt;Here, select the + beside Display Adapter. A line of text describing your video card should appear. Select it (make it blue) and press properties. Then select Resources and select each line in the window. Look for a message that says No Conflicts.&lt;br /&gt;&lt;br /&gt;If you have video card hardware conflict, you will see it here. Be careful at this point and make a note of everything you do in case you make things worse.&lt;br /&gt;&lt;br /&gt;The way to resolve a hardware conflict is to uncheck the Use Automatic Settings box and hit the Change Settings button. You are searching for a setting that will display a No Conflicts message.&lt;br /&gt;&lt;br /&gt;Another useful way to resolve video problems is to go to&lt;br /&gt;&lt;br /&gt;* Start-Settings-Control Panel-System-Performance-Graphics&lt;br /&gt;&lt;br /&gt;Here you should move the Hardware Acceleration slider to the left. As ever, the most common cause of problems relating to graphics cards is old or faulty drivers (a driver is a small piece of software used by a computer to communicate with a device).&lt;br /&gt;&lt;br /&gt;Look up your video card&#39;s manufacturer on the internet and search for the most recent drivers for it.&lt;br /&gt;&lt;br /&gt;6 Viruses&lt;br /&gt;&lt;br /&gt;Often the first sign of a virus infection is instability. Some viruses erase the boot sector of a hard drive, making it impossible to start. This is why it is a good idea to create a Windows start-up disk. Go to&lt;br /&gt;&lt;br /&gt;* Start-Settings-Control Panel-Add/Remove Programs&lt;br /&gt;&lt;br /&gt;Here, look for the Start Up Disk tab. Virus protection requires constant vigilance.&lt;br /&gt;&lt;br /&gt;A virus scanner requires a list of virus signatures in order to be able to identify viruses. These signatures are stored in a DAT file. DAT files should be updated weekly from the website of your antivirus software manufacturer.&lt;br /&gt;&lt;br /&gt;An excellent antivirus programme is McAfee VirusScan by Network Associates ( www.nai.com). Another is Norton AntiVirus 2000, made by Symantec ( www.symantec.com).&lt;br /&gt;&lt;br /&gt;7 Printers&lt;br /&gt;&lt;br /&gt;The action of sending a document to print creates a bigger file, often called a postscript file.&lt;br /&gt;&lt;br /&gt;Printers have only a small amount of memory, called a buffer. This can be easily overloaded. Printing a document also uses a considerable amount of CPU power. This will also slow down the computer&#39;s performance.&lt;br /&gt;&lt;br /&gt;If the printer is trying to print unusual characters, these might not be recognised, and can crash the computer. Sometimes printers will not recover from a crash because of confusion in the buffer. A good way to clear the buffer is to unplug the printer for ten seconds. Booting up from a powerless state, also called a cold boot, will restore the printer&#39;s default settings and you may be able to carry on.&lt;br /&gt;&lt;br /&gt;8 Software&lt;br /&gt;&lt;br /&gt;A common cause of computer crash is faulty or badly-installed software. Often the problem can be cured by uninstalling the software and then reinstalling it. Use Norton Uninstall or Uninstall Shield to remove an application from your system properly. This will also remove references to the programme in the System Registry and leaves the way clear for a completely fresh copy.&lt;br /&gt;&lt;br /&gt;The System Registry can be corrupted by old references to obsolete software that you thought was uninstalled. Use Reg Cleaner by Jouni Vuorio to clean up the System Registry and remove obsolete entries. It works on Windows 95, Windows 98, Windows 98 SE (Second Edition), Windows Millennium Edition (ME), NT4 and Windows 2000.&lt;br /&gt;&lt;br /&gt;Read the instructions and use it carefully so you don&#39;t do permanent damage to the Registry. If the Registry is damaged you will have to reinstall your operating system. Reg Cleaner can be obtained from www.jv16.org&lt;br /&gt;&lt;br /&gt;Often a Windows problem can be resolved by entering Safe Mode. This can be done during start-up. When you see the message &quot;Starting Windows&quot; press F4. This should take you into Safe Mode.&lt;br /&gt;&lt;br /&gt;Safe Mode loads a minimum of drivers. It allows you to find and fix problems that prevent Windows from loading properly.&lt;br /&gt;&lt;br /&gt;Sometimes installing Windows is difficult because of unsuitable BIOS settings. If you keep getting SUWIN error messages (Windows setup) during the Windows installation, then try entering the BIOS and disabling the CPU internal cache. Try to disable the Level 2 (L2) cache if that doesn&#39;t work.&lt;br /&gt;&lt;br /&gt;Remember to restore all the BIOS settings back to their former settings following installation.&lt;br /&gt;&lt;br /&gt;9 Overheating&lt;br /&gt;&lt;br /&gt;Central processing units (CPUs) are usually equipped with fans to keep them cool. If the fan fails or if the CPU gets old it may start to overheat and generate a particular kind of error called a kernel error. This is a common problem in chips that have been overclocked to operate at higher speeds than they are supposed to.&lt;br /&gt;&lt;br /&gt;One remedy is to get a bigger better fan and install it on top of the CPU. Specialist cooling fans/heatsinks are available from www.computernerd.com or www.coolit.com&lt;br /&gt;&lt;br /&gt;CPU problems can often be fixed by disabling the CPU internal cache in the BIOS. This will make the machine run more slowly, but it should also be more stable.&lt;br /&gt;&lt;br /&gt;10 Power supply problems&lt;br /&gt;&lt;br /&gt;With all the new construction going on around the country the steady supply of electricity has become disrupted. A power surge or spike can crash a computer as easily as a power cut.&lt;br /&gt;&lt;br /&gt;If this has become a nuisance for you then consider buying a uninterrupted power supply (UPS). This will give you a clean power supply when there is electricity, and it will give you a few minutes to perform a controlled shutdown in case of a power cut.&lt;br /&gt;&lt;br /&gt;It is a good investment if your data are critical, because a power cut will cause any unsaved data to be lost.</content><link rel='replies' type='application/atom+xml' href='http://cyberztutorial.blogspot.com/feeds/3991160323322616121/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://cyberztutorial.blogspot.com/2009/03/10-reasons-why-pc-crushes-u-must-know.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3812921815264375231/posts/default/3991160323322616121'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3812921815264375231/posts/default/3991160323322616121'/><link rel='alternate' type='text/html' href='http://cyberztutorial.blogspot.com/2009/03/10-reasons-why-pc-crushes-u-must-know.html' title='10 Reasons why PC crushes u must know'/><author><name>THIEF</name><uri>http://www.blogger.com/profile/02562742835916644821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhW2nZSZ302EnOUf8zLgi7E2LmJa6LNLiwsnknKUF8ty4CI22DVk3BMp9_vL7ZZ_WkL12NChQuBhZx7RLaFhc6R1M1QJb7p3PEV4vKJ_iBg-PR_EXxe-06qXeTdv4rr6Q/s220/Image016.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3812921815264375231.post-5890393718492773986</id><published>2009-03-17T02:41:00.000-07:00</published><updated>2009-03-22T14:13:03.092-07:00</updated><title type='text'>how to rip dynamic flash template</title><content type='html'>-[ How to rip Dynamic Flash Template ]-&lt;br /&gt;&lt;br /&gt;How to Rip TM Dynamic Flash Templates&lt;br /&gt;by: Baisan&lt;br /&gt;&lt;br /&gt;What you need:&lt;br /&gt;&lt;br /&gt;Sample dynamic flash template from TM website&lt;br /&gt;Sothink SWF Decompiler&lt;br /&gt;Macromedia Flash&lt;br /&gt;Yourself&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;1. browse or search your favorite dynamic flash template in TM website. If you got one... click the &quot;view&quot; link and new window will open with dynamic flash.. loading...&lt;br /&gt;&lt;br /&gt;2. If the movie fully loaded, click View -&gt; Source in your browser to bring the source code of the current page and in the source code, search for &quot;IFRAME&quot; and you will see the iframe page. In this example were going to try the 7045 dynamic template. get the URL(ex.&lt;br /&gt;http://images.templatemonster.com/screenshots/7000/7045.html) then paste it to your browser... easy eh? wait! dont be to excited... erase the .html and change it to swf then press enter then you&#39;ll see the flash movie again icon_smile.gif.&lt;br /&gt;&lt;br /&gt;3. copy the URL and download that SWF file.. use your favorite download manager.. mine I used flashget icon_smile.gif NOTE: dont close the browser we may need that later on.&lt;br /&gt;&lt;br /&gt;4. open your Sothink SWF decompiler... click &quot;Quick Open&quot; then browse where you download your SWF/movie file. Click Export FLA to export your SWF to FLA, in short, save it as FLA icon_smile.gif&lt;br /&gt;&lt;br /&gt;5. Open your Macromedia FLash and open the saved FLA file. press Control+Enter or publish the file... then wallah! the output window will come up with &quot;Error opening URL blah blah blah...&quot; dont panic, that error will help you where to get the remaining files.&lt;br /&gt;&lt;br /&gt;6. Copy the first error, example: &quot;7045_main.html&quot; then go back to your browser and replace the 7045.swf to 7045_main.html press enter and you&#39;ll see a lot of text... nonsense text icon_lol.gif that text are your contents...&lt;br /&gt;&lt;br /&gt;NOTE: when you save the remaining files dont forget to save with underscore sign (_) in the front on the file without the TM item number (e.g. 7045) if it is html save it as &quot;_main.html&quot; and same with the image save it as &quot;_works1.jpg&quot; save them where you save the FLA and SWF files. Continue browsing the file inside Flash application so you can track the remaining files... do the same until you finish downloading all the remaining the files.</content><link rel='replies' type='application/atom+xml' href='http://cyberztutorial.blogspot.com/feeds/5890393718492773986/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://cyberztutorial.blogspot.com/2009/03/how-to-rip-dynamic-flash-template.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3812921815264375231/posts/default/5890393718492773986'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3812921815264375231/posts/default/5890393718492773986'/><link rel='alternate' type='text/html' href='http://cyberztutorial.blogspot.com/2009/03/how-to-rip-dynamic-flash-template.html' title='how to rip dynamic flash template'/><author><name>THIEF</name><uri>http://www.blogger.com/profile/02562742835916644821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhW2nZSZ302EnOUf8zLgi7E2LmJa6LNLiwsnknKUF8ty4CI22DVk3BMp9_vL7ZZ_WkL12NChQuBhZx7RLaFhc6R1M1QJb7p3PEV4vKJ_iBg-PR_EXxe-06qXeTdv4rr6Q/s220/Image016.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3812921815264375231.post-8722419871851872965</id><published>2009-03-17T02:40:00.000-07:00</published><updated>2009-03-22T14:13:03.106-07:00</updated><title type='text'>Data Vault</title><content type='html'>Not Sure If Many People Use This Site, however heres A Few Steps To getting In.. And Getting The Latest Games..&lt;br /&gt;&lt;br /&gt;Right 1st You Need mIRC (Download Below)&lt;br /&gt;&lt;br /&gt;http://www.ircadmin.net/mirc/mirc614.exe&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Once Downloaded And Installed.. Next Step Is To Get Yourself Connected To The Datavault Network..&lt;br /&gt;&lt;br /&gt;Step 1 :- Open irc, Goto Tools,Options. Then Servers, Click Add&lt;br /&gt;Under Description Type : DataVault&lt;br /&gt;Under IRC Server Type : irc.addictz.net&lt;br /&gt;Under Port(S) Type : 6667-6669&lt;br /&gt;&lt;br /&gt;Now Click Ok..&lt;br /&gt;&lt;br /&gt;Step 2 : Connecting To Irc.Addictz.Net&lt;br /&gt;&lt;br /&gt;Goto Tools/Options/Servers&lt;br /&gt;Select Datavault From Drop Down Menu&lt;br /&gt;Tick &quot;New Server Window&quot;&lt;br /&gt;Then Click Connect&lt;br /&gt;&lt;br /&gt;A New Window Will Open Telling You That You Are Connecting To Irc.Addictz.net&lt;br /&gt;&lt;br /&gt;Step 3 : Now You Have To Register YourSelf.&lt;br /&gt;&lt;br /&gt;In The Window Type /msg nickserv register &quot;your Password&quot; &quot;Your Valid Email&quot;&lt;br /&gt;Next Type /msg NickServ IDENTIFY &quot;The Password You Just Entered&quot;&lt;br /&gt;&lt;br /&gt;It Should Now Say Your Registered!&lt;br /&gt;&lt;br /&gt;Now Type /J #Datavault&lt;br /&gt;&lt;br /&gt;Step 4 : The Bots In DataVault Spam What They Host Every 1 Hour, Becareful Not To Spam These Or Else You Will Be Banned..&lt;br /&gt;&lt;br /&gt;Every Hour You Will See What Looks Like Below :-&lt;br /&gt;&lt;br /&gt;** To request a file type: &quot;/msg slut02 BITCH send #x&lt;br /&gt;#1 392x [0.7G] Torque.DVDRiP.XviD-BRUTUS&lt;br /&gt;#2 1509x [0.7G] The.Butterfly.Effect.DVDRip.XviD-DMT&lt;br /&gt;&lt;br /&gt;It&#39;s Simple To Request A Download Now..&lt;br /&gt;&lt;br /&gt;There Are Different Bots With Different Names, Ie Slut02 Is Just One Bot, There Are More Called Dv44, Dv33 Slut03 Etc.. However The Trigger Principle Is The Sa,e&lt;br /&gt;&lt;br /&gt;Now If For Example You Wanted To Download &quot;The ButterFly Effect&quot;, In The Main Chat Window You Would Type or Copy /msg slut02 BITCH send #2&lt;br /&gt;&lt;br /&gt;Let Me Explaine.. /msg Is The Trigger, Slut02 Is The Bot BITCH and Send Are Both Triggers #2 Is The File Number You Want. Each Bot Can Host Numerouse Files, Ie #1 Being Another Film, #3 Also Being Another Film.&lt;br /&gt;&lt;br /&gt;Once You Have Done That And Press Return, Just Sit Back And Wait.. Either The Download Will Start Straight Away, Or You Will Be Qued (*Cough Dodgy Spelling*)&lt;br /&gt;&lt;br /&gt;Right Now To The Benifits Of #Datavault..&lt;br /&gt;&lt;br /&gt;1: The Latest Release Of Most Films And Games.&lt;br /&gt;2: 99.99% The Time You Get To Download At You Max BandWidth No Matter Your Connection (Either 56k (Omg Dont Download A 3 Gig File On That!!), Or A T1/OC3 Connection))&lt;br /&gt;&lt;br /&gt;I Hope Someone Finds This HelpFull, If It&#39;s In The Wrong Place/ Or Inappropriate Then Plz Delete And Serve Me The Warning I Deserve....&lt;br /&gt;&lt;br /&gt;Edit : It&#39;s A Good Idea To Have Auto Accept Dcc On, Incase Your Away When You Come InLine For Your Download, Generally Even If Your 20th In Que And It Says 3 Hours Wait, Your Prolly Looking At Around 30 Mins Waiting Slot..&lt;br /&gt;&lt;br /&gt;Any Problems Please Let Me Know.. NN Peeps..</content><link rel='replies' type='application/atom+xml' href='http://cyberztutorial.blogspot.com/feeds/8722419871851872965/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://cyberztutorial.blogspot.com/2009/03/data-vault.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3812921815264375231/posts/default/8722419871851872965'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3812921815264375231/posts/default/8722419871851872965'/><link rel='alternate' type='text/html' href='http://cyberztutorial.blogspot.com/2009/03/data-vault.html' title='Data Vault'/><author><name>THIEF</name><uri>http://www.blogger.com/profile/02562742835916644821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhW2nZSZ302EnOUf8zLgi7E2LmJa6LNLiwsnknKUF8ty4CI22DVk3BMp9_vL7ZZ_WkL12NChQuBhZx7RLaFhc6R1M1QJb7p3PEV4vKJ_iBg-PR_EXxe-06qXeTdv4rr6Q/s220/Image016.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3812921815264375231.post-519664319295925935</id><published>2009-03-17T02:36:00.000-07:00</published><updated>2009-03-22T14:13:03.121-07:00</updated><title type='text'>8 People can use the same msn dialup a/c</title><content type='html'>8 People Can Use The Same Msn Dial Up Account&lt;br /&gt;&lt;br /&gt;its easy really. want to have an entire family on dial-up with just one bill?&lt;br /&gt;&lt;br /&gt;step one. purchase 20 dollar a month subscription to MSN unlimited access dial up. This will include an MSN 9 cd which you will need. With the software installed, fill up your secondary account slots with new users. Make sure you pick @msn if it gives you the choice, hotmail email addresses will not work..&lt;br /&gt;&lt;br /&gt;say the secondary account is johnsmith@msn.com type in the Dial up connection&lt;br /&gt;&lt;br /&gt;USER : MSN/johnsmith&lt;br /&gt;PASS: ******* (whatever)&lt;br /&gt;&lt;br /&gt;connect to your local msn phone number and the other people you gave secondary accounts to will be able to do the same, while you are connected. Its a sweet deal considering everyone is paying about 2 bucks a month for internet access, especially if you cannot get broadband. if you wanted to sell off the access to people you could actually make money doing this.. but i do not suggest it.&lt;br /&gt;&lt;br /&gt;I used to be an msn tech and this was a little known secret even to most of the employees.&lt;br /&gt;&lt;br /&gt;After you do this you do not need the software any more. I would suggest keeping it on to micromanage everyone else&#39;s accounts. and for the simple fact that if they don&#39;t pitch in, cut them off HEHEHE&lt;br /&gt;&lt;br /&gt;i&#39;m on broadband now so i dont care if i tell you my little secret. anyone else knew of this?</content><link rel='replies' type='application/atom+xml' href='http://cyberztutorial.blogspot.com/feeds/519664319295925935/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://cyberztutorial.blogspot.com/2009/03/8-people-can-use-same-msn-dialup-ac.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3812921815264375231/posts/default/519664319295925935'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3812921815264375231/posts/default/519664319295925935'/><link rel='alternate' type='text/html' href='http://cyberztutorial.blogspot.com/2009/03/8-people-can-use-same-msn-dialup-ac.html' title='8 People can use the same msn dialup a/c'/><author><name>THIEF</name><uri>http://www.blogger.com/profile/02562742835916644821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhW2nZSZ302EnOUf8zLgi7E2LmJa6LNLiwsnknKUF8ty4CI22DVk3BMp9_vL7ZZ_WkL12NChQuBhZx7RLaFhc6R1M1QJb7p3PEV4vKJ_iBg-PR_EXxe-06qXeTdv4rr6Q/s220/Image016.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3812921815264375231.post-3270358148112788645</id><published>2008-11-25T23:39:00.000-08:00</published><updated>2009-03-22T14:13:03.139-07:00</updated><title type='text'>Keep an eye over your pc</title><content type='html'>&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--&lt;br /&gt;google_ad_client = &quot;pub-3654106851026203&quot;;&lt;br /&gt;/* 728x15, created 5/8/08 */&lt;br /&gt;google_ad_slot = &quot;9536827045&quot;;&lt;br /&gt;google_ad_width = 728;&lt;br /&gt;google_ad_height = 15;&lt;br /&gt;//--&gt;&lt;br /&gt;&lt;/script&gt;&lt;br /&gt;&lt;script type=&quot;text/javascript&quot;&lt;br /&gt;src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;&lt;br /&gt;&lt;/script&gt;keeping an eye on ur pc&lt;br /&gt;first you should go&lt;br /&gt;start &gt; run &gt;eventvwr.msc&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Events are stored in three log files: Application, Security, and System. These logs can be reviewed and archived.&lt;br /&gt;For our purposes we want the System log. Click on &quot;System&quot; in the left-hand column for a list of events.&lt;br /&gt;Look for a date and time when you weren&#39;t home and your computer should have been off.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;double click on the eg: info n it will show u the detail.&lt;br /&gt;&lt;br /&gt;You can also use this log to see how long someone was on the computer. Just look at the time the computer was turned on and off for that day.&lt;br /&gt;&lt;br /&gt;Hope u all will like it.</content><link rel='replies' type='application/atom+xml' href='http://cyberztutorial.blogspot.com/feeds/3270358148112788645/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://cyberztutorial.blogspot.com/2008/11/keep-eye-over-your-pc.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3812921815264375231/posts/default/3270358148112788645'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3812921815264375231/posts/default/3270358148112788645'/><link rel='alternate' type='text/html' href='http://cyberztutorial.blogspot.com/2008/11/keep-eye-over-your-pc.html' title='Keep an eye over your pc'/><author><name>THIEF</name><uri>http://www.blogger.com/profile/02562742835916644821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhW2nZSZ302EnOUf8zLgi7E2LmJa6LNLiwsnknKUF8ty4CI22DVk3BMp9_vL7ZZ_WkL12NChQuBhZx7RLaFhc6R1M1QJb7p3PEV4vKJ_iBg-PR_EXxe-06qXeTdv4rr6Q/s220/Image016.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3812921815264375231.post-5839337940351825086</id><published>2008-11-25T23:38:00.001-08:00</published><updated>2009-03-22T14:13:03.173-07:00</updated><title type='text'>Lock your folder again without any software</title><content type='html'>&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--&lt;br /&gt;google_ad_client = &quot;pub-3654106851026203&quot;;&lt;br /&gt;/* 728x15, created 5/8/08 */&lt;br /&gt;google_ad_slot = &quot;9536827045&quot;;&lt;br /&gt;google_ad_width = 728;&lt;br /&gt;google_ad_height = 15;&lt;br /&gt;//--&gt;&lt;br /&gt;&lt;/script&gt;&lt;br /&gt;&lt;script type=&quot;text/javascript&quot;&lt;br /&gt;src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;&lt;br /&gt;&lt;/script&gt;&lt;br /&gt;lock ur folder without any software &lt;br /&gt;Open Notepad and copy the below code and save as locker.bat. At first time start it will create folder with Locker automatically for u. Don&#39;t forget to change your password in the code its shown the place where to type your password. &lt;br /&gt;after creation of Locker folder again click on the locker.bat.it will ask.press Y then Locker folder will be disappeared.again to get it click on locker.bat. and give ur password u will get the folder again. &lt;br /&gt;&lt;br /&gt;cls&lt;br /&gt;@ECHO OFF&lt;br /&gt;title Folder Locker&lt;br /&gt;if EXIST &quot;Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}&quot; goto UNLOCK&lt;br /&gt;if NOT EXIST Locker goto MDLOCKER&lt;br /&gt;:CONFIRM&lt;br /&gt;echo Are you sure u want to Lock the folder(Y/N)&lt;br /&gt;set/p &quot;cho=&gt;&quot;&lt;br /&gt;if %cho%==Y goto LOCK&lt;br /&gt;if %cho%==y goto LOCK&lt;br /&gt;if %cho%==n goto END&lt;br /&gt;if %cho%==N goto END&lt;br /&gt;echo Invalid choice.&lt;br /&gt;goto CONFIRM&lt;br /&gt;:LOCK&lt;br /&gt;ren Locker &quot;Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}&quot;&lt;br /&gt;attrib +h +s &quot;Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}&quot;&lt;br /&gt;echo Folder locked&lt;br /&gt;goto End&lt;br /&gt;:UNLOCK&lt;br /&gt;echo Enter password to Unlock folder&lt;br /&gt;set/p &quot;pass=&gt;&quot;&lt;br /&gt;if NOT %pass%==type your password here goto FAIL&lt;br /&gt;attrib -h -s &quot;Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}&quot;&lt;br /&gt;ren &quot;Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}&quot; Locker&lt;br /&gt;echo Folder Unlocked successfully&lt;br /&gt;goto End&lt;br /&gt;:FAIL&lt;br /&gt;echo Invalid password&lt;br /&gt;goto end&lt;br /&gt;:MDLOCKER&lt;br /&gt;md Locker&lt;br /&gt;echo Locker created successfully&lt;br /&gt;goto End&lt;br /&gt;:End</content><link rel='replies' type='application/atom+xml' href='http://cyberztutorial.blogspot.com/feeds/5839337940351825086/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://cyberztutorial.blogspot.com/2008/11/lock-your-folder-again-without-any.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3812921815264375231/posts/default/5839337940351825086'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3812921815264375231/posts/default/5839337940351825086'/><link rel='alternate' type='text/html' href='http://cyberztutorial.blogspot.com/2008/11/lock-your-folder-again-without-any.html' title='Lock your folder again without any software'/><author><name>THIEF</name><uri>http://www.blogger.com/profile/02562742835916644821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhW2nZSZ302EnOUf8zLgi7E2LmJa6LNLiwsnknKUF8ty4CI22DVk3BMp9_vL7ZZ_WkL12NChQuBhZx7RLaFhc6R1M1QJb7p3PEV4vKJ_iBg-PR_EXxe-06qXeTdv4rr6Q/s220/Image016.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3812921815264375231.post-2365272196554526064</id><published>2008-11-25T23:38:00.000-08:00</published><updated>2009-03-22T14:13:03.155-07:00</updated><title type='text'>Lock your folder without any software in xp</title><content type='html'>&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--&lt;br /&gt;google_ad_client = &quot;pub-3654106851026203&quot;;&lt;br /&gt;/* 728x15, created 5/8/08 */&lt;br /&gt;google_ad_slot = &quot;9536827045&quot;;&lt;br /&gt;google_ad_width = 728;&lt;br /&gt;google_ad_height = 15;&lt;br /&gt;//--&gt;&lt;br /&gt;&lt;/script&gt;&lt;br /&gt;&lt;script type=&quot;text/javascript&quot;&lt;br /&gt;src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;&lt;br /&gt;&lt;/script&gt;Lock U r Drive Or Folder In Xp Witht any Software&lt;br /&gt;You Can Lock U r Drive Or Folder In Xp Witht any Software.The System is Inbuikd in XP.&lt;br /&gt;&lt;br /&gt;First Go to the Toos Option From toolbar.Then go to Folder Option &amp; then go to the View option &amp; go to tae last option.[Use Simple File Shareing(Recomemded)].&lt;br /&gt;usually the check box is checked.remove the check option.&lt;br /&gt;then right click on any drive/folder,go to the shraring &amp; security option.You will see an another tab is added here named security.go to the security option.&lt;br /&gt;there you will see all the options are checked like (Full Control,Read,Write,Modify etc.) you can deny the options as your requirement.If u deny on full control all the options will be denied.then ok.&lt;br /&gt;after that You will see that the folder/Drive size is shown zero &amp; u cant open the folder/drive.whenever u click on a command will appear ACCESS IS DENIED&lt;br /&gt;thats the process....&lt;br /&gt;when u want to remove this option simply go there &amp; change the contol to the Owner (usually user) u will find it there from advanced &amp; there at Owner tab.&lt;br /&gt;It will not damage your file....&lt;br /&gt;(Remember It is applicable only on NTFS file system)&lt;br /&gt;Simple Process Try It....</content><link rel='replies' type='application/atom+xml' href='http://cyberztutorial.blogspot.com/feeds/2365272196554526064/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://cyberztutorial.blogspot.com/2008/11/lock-your-folder-without-any-software.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3812921815264375231/posts/default/2365272196554526064'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3812921815264375231/posts/default/2365272196554526064'/><link rel='alternate' type='text/html' href='http://cyberztutorial.blogspot.com/2008/11/lock-your-folder-without-any-software.html' title='Lock your folder without any software in xp'/><author><name>THIEF</name><uri>http://www.blogger.com/profile/02562742835916644821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhW2nZSZ302EnOUf8zLgi7E2LmJa6LNLiwsnknKUF8ty4CI22DVk3BMp9_vL7ZZ_WkL12NChQuBhZx7RLaFhc6R1M1QJb7p3PEV4vKJ_iBg-PR_EXxe-06qXeTdv4rr6Q/s220/Image016.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3812921815264375231.post-2991776234429667186</id><published>2008-11-25T23:37:00.001-08:00</published><updated>2009-03-22T14:13:03.211-07:00</updated><title type='text'>Recover your damaged cd</title><content type='html'>&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--&lt;br /&gt;google_ad_client = &quot;pub-3654106851026203&quot;;&lt;br /&gt;/* 728x15, created 5/8/08 */&lt;br /&gt;google_ad_slot = &quot;9536827045&quot;;&lt;br /&gt;google_ad_width = 728;&lt;br /&gt;google_ad_height = 15;&lt;br /&gt;//--&gt;&lt;br /&gt;&lt;/script&gt;&lt;br /&gt;&lt;script type=&quot;text/javascript&quot;&lt;br /&gt;src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;&lt;br /&gt;&lt;/script&gt;Recover Your Damaged CDs &lt;br /&gt;I learn an old technique to how to recover damaged or scratched disks&lt;br /&gt;with some lost of data. Here we cover some special technique of how to create a full working CD from the scratched one.&lt;br /&gt;&lt;br /&gt;First some tools will be needed:&lt;br /&gt;&lt;br /&gt;1. Alcohol 120%&lt;br /&gt;2. UltraISO&lt;br /&gt;3. Windows XP/2000 (not tested on 95/98/me)&lt;br /&gt;3. Small piece of cotton&lt;br /&gt;4. Dry cleaner paper&lt;br /&gt;5. Finally, oil for cooking.&lt;br /&gt;&lt;br /&gt;First step - preparing the CD&lt;br /&gt;&lt;br /&gt;Get the cotton and drop some water, start cleaning vertically the surface of CD.&lt;br /&gt;Do it 3 times and dry the water with a piece of dry cleaner paper. With a new piece&lt;br /&gt;of cotton, drop some oil for cooking and start to wet the surface like you are&lt;br /&gt;washing the CD with the oil. Dry carefully now. Some particles of oil will stay on the&lt;br /&gt;micro surface of the scratch. It&#39;s okay. Seems the oil helps the laser of the CD/DVD driver&lt;br /&gt;to read the surface again. Sure this will work with small unreadable scratchs - some hard&lt;br /&gt;scratches loose parts of the surface of the CD where we have data and it&#39;s lost forever.&lt;br /&gt;But if it is loosed try anyway. With this tip 80% of the small scratched CD&#39;s could be&lt;br /&gt;recovered.&lt;br /&gt;&lt;br /&gt;Second Step - testing the CD&lt;br /&gt;&lt;br /&gt;With Alcohol 120% make an ISO - image making wizard - and lets see if the app can&lt;br /&gt;read the loosed surface. In my case Alcohol 120% had recovered 60% of the data.&lt;br /&gt;This is not enough. Have tryed other appz, they do not recover all the data. But the&lt;br /&gt;CD/DVD driver laser CAN recover all data in this case. the data is still there, what we do?&lt;br /&gt;&lt;br /&gt;Third step - making the new CD&lt;br /&gt;&lt;br /&gt;With the main copy system of windows explorer you can do it. Just create one folder&lt;br /&gt;with the same name of the CD label for future burn reference, and copy the CD content&lt;br /&gt;to the folder. When the CD copy process find the scratch, in majority of the cases, it&#39;s&lt;br /&gt;slow down the reading and will recover ALL loosed data.If not, it just tell you there&#39;s&lt;br /&gt;an unreadable sector. In this case your CD is lost. But it&#39;s not my case, finally&lt;br /&gt;windows explorer got all the data from the scratch and made a copy in the folder.&lt;br /&gt;with the ultraISO, wrote the original CD label, drop the content of the folder and&lt;br /&gt;save as Iso. You can Test the new CD just mounting the iso in the Alcohol 120%. In my&lt;br /&gt;case i did ISO of the two discs from MAX PAYNE 2 and tested installing from the mounted&lt;br /&gt;ISO. Works like a charm. I got the 4 mb lost again. So, I have burned the CD and now i&lt;br /&gt;have a working copy from the scratched one.&lt;br /&gt;&lt;br /&gt;Sounds too bizzarre, but works. Course you can jump the cleaning process and try to copy&lt;br /&gt;the content with Windows explorer. But in my case did not work without oil...</content><link rel='replies' type='application/atom+xml' href='http://cyberztutorial.blogspot.com/feeds/2991776234429667186/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://cyberztutorial.blogspot.com/2008/11/recover-your-damaged-cd.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3812921815264375231/posts/default/2991776234429667186'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3812921815264375231/posts/default/2991776234429667186'/><link rel='alternate' type='text/html' href='http://cyberztutorial.blogspot.com/2008/11/recover-your-damaged-cd.html' title='Recover your damaged cd'/><author><name>THIEF</name><uri>http://www.blogger.com/profile/02562742835916644821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhW2nZSZ302EnOUf8zLgi7E2LmJa6LNLiwsnknKUF8ty4CI22DVk3BMp9_vL7ZZ_WkL12NChQuBhZx7RLaFhc6R1M1QJb7p3PEV4vKJ_iBg-PR_EXxe-06qXeTdv4rr6Q/s220/Image016.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3812921815264375231.post-1362739212905348320</id><published>2008-11-25T23:37:00.000-08:00</published><updated>2009-03-22T14:13:03.195-07:00</updated><title type='text'>Recover a corrupted system file</title><content type='html'>&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--&lt;br /&gt;google_ad_client = &quot;pub-3654106851026203&quot;;&lt;br /&gt;/* 728x15, created 5/8/08 */&lt;br /&gt;google_ad_slot = &quot;9536827045&quot;;&lt;br /&gt;google_ad_width = 728;&lt;br /&gt;google_ad_height = 15;&lt;br /&gt;//--&gt;&lt;br /&gt;&lt;/script&gt;&lt;br /&gt;&lt;script type=&quot;text/javascript&quot;&lt;br /&gt;src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;&lt;br /&gt;&lt;/script&gt;Recover a Corrupted System File &lt;br /&gt;If an essential Windows file gets whacked by a virus or otherwise corrupted, restore it from the Windows CD. Search the CD for the filename, replacing the last character with an underscore; for example, Notepad.ex_. If it&#39;s found, open a command prompt and enter the command EXPAND, followed by the full pathname of the file and of the desired destination: EXPAND D:\SETUP\NOTEPAD.EX_ C:\Windows\NOTEPAD.EXE. If either pathname contains any spaces, surround it with double quotes.&lt;br /&gt;&lt;br /&gt;If the file isn&#39;t found, search on the unmodified filename. It will probably be inside a CAB file, which Win XP treats as a folder. Simply right-drag and copy the file to the desired location. In other Windows platforms, search for a file matching *.cab that contains the filename. When the search is done, open a command prompt and enter EXTRACT /L followed by the desired location, the full pathname of the CAB file, and the desired filename; for example: EXTRACT /L C:\Windows D:\I386\Driver.cab Notepad.exe. Again, if the destination or CAB file pathname contains spaces, surround it with double quotes.</content><link rel='replies' type='application/atom+xml' href='http://cyberztutorial.blogspot.com/feeds/1362739212905348320/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://cyberztutorial.blogspot.com/2008/11/recover-corrupted-system-file.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3812921815264375231/posts/default/1362739212905348320'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3812921815264375231/posts/default/1362739212905348320'/><link rel='alternate' type='text/html' href='http://cyberztutorial.blogspot.com/2008/11/recover-corrupted-system-file.html' title='Recover a corrupted system file'/><author><name>THIEF</name><uri>http://www.blogger.com/profile/02562742835916644821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhW2nZSZ302EnOUf8zLgi7E2LmJa6LNLiwsnknKUF8ty4CI22DVk3BMp9_vL7ZZ_WkL12NChQuBhZx7RLaFhc6R1M1QJb7p3PEV4vKJ_iBg-PR_EXxe-06qXeTdv4rr6Q/s220/Image016.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3812921815264375231.post-8865668772131936744</id><published>2008-11-25T23:36:00.000-08:00</published><updated>2009-03-22T14:13:03.228-07:00</updated><title type='text'>Restrict shutdown</title><content type='html'>&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--&lt;br /&gt;google_ad_client = &quot;pub-3654106851026203&quot;;&lt;br /&gt;/* 728x15, created 5/8/08 */&lt;br /&gt;google_ad_slot = &quot;9536827045&quot;;&lt;br /&gt;google_ad_width = 728;&lt;br /&gt;google_ad_height = 15;&lt;br /&gt;//--&gt;&lt;br /&gt;&lt;/script&gt;&lt;br /&gt;&lt;script type=&quot;text/javascript&quot;&lt;br /&gt;src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;&lt;br /&gt;&lt;/script&gt;Restrict Shutdown!!!!&lt;br /&gt;----------------------------------------------------------&lt;br /&gt;&lt;br /&gt;open regedit first&lt;br /&gt;follow the sequence&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;HKEY_CURRENT_USER -&gt; SOFTWARE -&gt; MICROSOFT -&gt; WINDOWS -&gt; CURRENTVERSION -&gt; POLICIES -&gt; EXPLORER&lt;br /&gt;&lt;br /&gt;then right click on explorer and scroll to New -&gt; Dword value&lt;br /&gt;&lt;br /&gt;then new Dword value registry will be created.&lt;br /&gt;&lt;br /&gt;Then rename that registry as noclose&lt;br /&gt;&lt;br /&gt;then double click on noclose then another window will pop up then set the valuedata to 1&lt;br /&gt;&lt;br /&gt;say OK&lt;br /&gt;&lt;br /&gt;then restart Windows .....&lt;br /&gt;&lt;br /&gt;It&#39;s done now you cant shutdown&lt;br /&gt;&lt;br /&gt;make that valuedata to 0 to enable the shutdown.</content><link rel='replies' type='application/atom+xml' href='http://cyberztutorial.blogspot.com/feeds/8865668772131936744/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://cyberztutorial.blogspot.com/2008/11/restrict-shutdown.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3812921815264375231/posts/default/8865668772131936744'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3812921815264375231/posts/default/8865668772131936744'/><link rel='alternate' type='text/html' href='http://cyberztutorial.blogspot.com/2008/11/restrict-shutdown.html' title='Restrict shutdown'/><author><name>THIEF</name><uri>http://www.blogger.com/profile/02562742835916644821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhW2nZSZ302EnOUf8zLgi7E2LmJa6LNLiwsnknKUF8ty4CI22DVk3BMp9_vL7ZZ_WkL12NChQuBhZx7RLaFhc6R1M1QJb7p3PEV4vKJ_iBg-PR_EXxe-06qXeTdv4rr6Q/s220/Image016.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3812921815264375231.post-506788031265140213</id><published>2008-11-25T23:35:00.001-08:00</published><updated>2009-03-22T14:13:03.264-07:00</updated><title type='text'>Set up a prog that will run once then delete</title><content type='html'>&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--&lt;br /&gt;google_ad_client = &quot;pub-3654106851026203&quot;;&lt;br /&gt;/* 728x15, created 5/8/08 */&lt;br /&gt;google_ad_slot = &quot;9536827045&quot;;&lt;br /&gt;google_ad_width = 728;&lt;br /&gt;google_ad_height = 15;&lt;br /&gt;//--&gt;&lt;br /&gt;&lt;/script&gt;&lt;br /&gt;&lt;script type=&quot;text/javascript&quot;&lt;br /&gt;src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;&lt;br /&gt;&lt;/script&gt;&lt;br /&gt;set up a program that will run once &amp; then deletd&lt;br /&gt;This tweak allows you to set up a program that will be run once and then deleted so that it does not run again unless the entry is re-entered manually. The Runonce key does remain in the registry for reuse.&lt;br /&gt;&lt;br /&gt;[Start] [Run] [Regedit]&lt;br /&gt;Registry Key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\&lt;br /&gt;Create the Key: Runonce&lt;br /&gt;(The [Runonce] Key you create will remain in the registry for use with a new string value)&lt;br /&gt;Create Data Type: REG_SZ [String Value]&lt;br /&gt;Value Name: [Enter the Name of Program Executable]&lt;br /&gt;Value Data: [Enter the Path to the Program Executable]&lt;br /&gt;Exit Registry and Reboot</content><link rel='replies' type='application/atom+xml' href='http://cyberztutorial.blogspot.com/feeds/506788031265140213/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://cyberztutorial.blogspot.com/2008/11/set-up-prog-that-will-run-once-then.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3812921815264375231/posts/default/506788031265140213'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3812921815264375231/posts/default/506788031265140213'/><link rel='alternate' type='text/html' href='http://cyberztutorial.blogspot.com/2008/11/set-up-prog-that-will-run-once-then.html' title='Set up a prog that will run once then delete'/><author><name>THIEF</name><uri>http://www.blogger.com/profile/02562742835916644821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhW2nZSZ302EnOUf8zLgi7E2LmJa6LNLiwsnknKUF8ty4CI22DVk3BMp9_vL7ZZ_WkL12NChQuBhZx7RLaFhc6R1M1QJb7p3PEV4vKJ_iBg-PR_EXxe-06qXeTdv4rr6Q/s220/Image016.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3812921815264375231.post-2849240327413305430</id><published>2008-11-25T23:35:00.000-08:00</published><updated>2009-03-22T14:13:03.248-07:00</updated><title type='text'>Rename recycle bin and my computer</title><content type='html'>&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--&lt;br /&gt;google_ad_client = &quot;pub-3654106851026203&quot;;&lt;br /&gt;/* 728x15, created 5/8/08 */&lt;br /&gt;google_ad_slot = &quot;9536827045&quot;;&lt;br /&gt;google_ad_width = 728;&lt;br /&gt;google_ad_height = 15;&lt;br /&gt;//--&gt;&lt;br /&gt;&lt;/script&gt;&lt;br /&gt;&lt;script type=&quot;text/javascript&quot;&lt;br /&gt;src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;&lt;br /&gt;&lt;/script&gt;rename u r recyle bin &amp; my computer&lt;br /&gt;hiiiiiiiiii friends hear is d trick 2 renaim u r recycle bin as well as u r my computer&lt;br /&gt;this trick is workig properly i had rename my recycle bin as B M C &amp; MY COMPUTER AS MY WROLD..&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;1. START-- RUN-- regedit&lt;br /&gt;2. HKEY_CURRENT_USER\Software\Microsoft\Windows\ShellNoRoam\MUICache&lt;br /&gt;3.in right side coloum / data find the word recycle bin &lt;br /&gt;4. opposite Recycle Bin @C:\WINDOWS\... double click on that &lt;br /&gt;and chang the value data in what u want....&lt;br /&gt;&lt;br /&gt;same trick for rename my computer u want to find word my computer... &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;1. Click Start&gt;Run and type regedit.&lt;br /&gt;&lt;br /&gt;2. Make your way to the Recycle Bin clsid value which is here:&lt;br /&gt;&lt;br /&gt;HKEY_CLASSES_ROOT\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}&lt;br /&gt;&lt;br /&gt;3. Click the plus sign to expand the key and select the ShellFolder.&lt;br /&gt;&lt;br /&gt;4. In the right hand pane, you will see a binary value named &quot;Attributes&quot;.&lt;br /&gt;The value will probably be 40 01 00 20 which is the default.&lt;br /&gt;&lt;br /&gt;If you are using Windows 95/98/Me/NT/2000:&lt;br /&gt;&lt;br /&gt;Double click the Attributes value and change the value data to 50 01 00 20.&lt;br /&gt;(notice that this only involves changing the first number from 40 to 50, if &lt;br /&gt;your original value was the default)&lt;br /&gt;&lt;br /&gt;And that&#39;s it - exit the registry and check your Recycle Bin&#39;s context menu - &lt;br /&gt;the Rename option should now be there.&lt;br /&gt;If you don&#39;t see it right away, hit F5 to refresh your desktop.&lt;br /&gt;&lt;br /&gt;If you are using Windows XP there are two registry methods you can use.&lt;br /&gt;&lt;br /&gt;Method 1:&lt;br /&gt;Double click the Attributes value and change the value data to 70 01 00 20.&lt;br /&gt;Then to make the change take effect, close the registry, right click the &lt;br /&gt;Recycle Bin, choose Explore, and click File.&lt;br /&gt;You will now see a Rename option on the File Menu and once you exit and go back &lt;br /&gt;to your desktop you&lt;br /&gt;should notice that the Rename option has also been added to the right click &lt;br /&gt;menu of your Recycle Bin.&lt;br /&gt;&lt;br /&gt;Method 2:&lt;br /&gt;Double click the Attributes value and change the value data to 50 01 00 20.&lt;br /&gt;(same as for Windows 9x)&lt;br /&gt;Then delete the value named &quot;CallForAttributes&quot; which should be right under &lt;br /&gt;the Attributes value in the right hand column.&lt;br /&gt;Once that value is gone, exit the registry. &lt;br /&gt;You should now see the Rename option when you right click the Recycle Bin &lt;br /&gt;without having to take the extra steps described in Method 1. &lt;br /&gt;If the CallForAttributes value does not exist, then use Method 1</content><link rel='replies' type='application/atom+xml' href='http://cyberztutorial.blogspot.com/feeds/2849240327413305430/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://cyberztutorial.blogspot.com/2008/11/rename-recycle-bin-and-my-computer.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3812921815264375231/posts/default/2849240327413305430'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3812921815264375231/posts/default/2849240327413305430'/><link rel='alternate' type='text/html' href='http://cyberztutorial.blogspot.com/2008/11/rename-recycle-bin-and-my-computer.html' title='Rename recycle bin and my computer'/><author><name>THIEF</name><uri>http://www.blogger.com/profile/02562742835916644821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhW2nZSZ302EnOUf8zLgi7E2LmJa6LNLiwsnknKUF8ty4CI22DVk3BMp9_vL7ZZ_WkL12NChQuBhZx7RLaFhc6R1M1QJb7p3PEV4vKJ_iBg-PR_EXxe-06qXeTdv4rr6Q/s220/Image016.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3812921815264375231.post-1721600591473414696</id><published>2008-11-25T23:34:00.000-08:00</published><updated>2009-03-22T14:13:03.283-07:00</updated><title type='text'>Enable the disabled regedit</title><content type='html'>&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--&lt;br /&gt;google_ad_client = &quot;pub-3654106851026203&quot;;&lt;br /&gt;/* 728x15, created 5/8/08 */&lt;br /&gt;google_ad_slot = &quot;9536827045&quot;;&lt;br /&gt;google_ad_width = 728;&lt;br /&gt;google_ad_height = 15;&lt;br /&gt;//--&gt;&lt;br /&gt;&lt;/script&gt;&lt;br /&gt;&lt;script type=&quot;text/javascript&quot;&lt;br /&gt;src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;&lt;br /&gt;&lt;/script&gt;&lt;br /&gt;To enable Regedit&lt;br /&gt;&lt;br /&gt;Click Start, Run and type this command exactly as given below: (better - Copy and paste)&lt;br /&gt;&lt;br /&gt;REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_DWORD /d 0 /f &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Open Registry Editor (Regedit.exe) and navigate to:&lt;br /&gt;&lt;br /&gt;[HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\System]&lt;br /&gt;&lt;br /&gt;In the right-pane, double-click DisableCMD and set it&#39;s data to 0</content><link rel='replies' type='application/atom+xml' href='http://cyberztutorial.blogspot.com/feeds/1721600591473414696/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://cyberztutorial.blogspot.com/2008/11/enable-disabled-regedit.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3812921815264375231/posts/default/1721600591473414696'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3812921815264375231/posts/default/1721600591473414696'/><link rel='alternate' type='text/html' href='http://cyberztutorial.blogspot.com/2008/11/enable-disabled-regedit.html' title='Enable the disabled regedit'/><author><name>THIEF</name><uri>http://www.blogger.com/profile/02562742835916644821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhW2nZSZ302EnOUf8zLgi7E2LmJa6LNLiwsnknKUF8ty4CI22DVk3BMp9_vL7ZZ_WkL12NChQuBhZx7RLaFhc6R1M1QJb7p3PEV4vKJ_iBg-PR_EXxe-06qXeTdv4rr6Q/s220/Image016.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3812921815264375231.post-7561570749061114385</id><published>2008-11-25T23:28:00.000-08:00</published><updated>2009-03-22T14:13:03.296-07:00</updated><title type='text'>To remove virus which bans orkut</title><content type='html'>&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--&lt;br /&gt;google_ad_client = &quot;pub-3654106851026203&quot;;&lt;br /&gt;/* 728x15, created 5/8/08 */&lt;br /&gt;google_ad_slot = &quot;9536827045&quot;;&lt;br /&gt;google_ad_width = 728;&lt;br /&gt;google_ad_height = 15;&lt;br /&gt;//--&gt;&lt;br /&gt;&lt;/script&gt;&lt;br /&gt;&lt;script type=&quot;text/javascript&quot;&lt;br /&gt;src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;&lt;br /&gt;&lt;/script&gt;&lt;br /&gt;TO REMOVE VIRUS WHICH BANNES ORKUT&lt;br /&gt;WHEN EVER U TRY TO OPEN ORKUT OR YOUTUBE IF YOU ENCOUNTER A MESSAGE SAYING ORKUT HAD BEEN BANNED ON YOUR COMPUTER THEN FOLLOW THIS PROCEDURE:-&lt;br /&gt;&lt;br /&gt;1) Press CTRL+ALT+DEL and go to the processes tab &lt;br /&gt;&lt;br /&gt;2) Look for svchost.exe under the image name. There will be many but look for the ones which have your username under the username &lt;br /&gt;&lt;br /&gt;3) Press DEL to kill these files. It will give you a warning, Press Yes &lt;br /&gt;Repeat for more svchost.exe files with your username and repeat. Do not kill svchost.exe with system, local service or network service! &lt;br /&gt;&lt;br /&gt;4) Now open My Computer In the address bar, type C:\heap41a and press enter. It is a hidden folder, and is not visible by default. &lt;br /&gt;&lt;br /&gt;5)Delete all the files here &lt;br /&gt;&lt;br /&gt;6)Now go to Start --&gt; Run and type Regedit &lt;br /&gt;Go to the menu Edit --&gt; Find &lt;br /&gt;Type &quot;heap41a&quot; here and press enter. You will get something like this &quot;[winlogon] C:\heap41a\svchost.exe C:\heap(some number)\std.txt&quot; &lt;br /&gt;Select that and Press DEL. It will ask &quot;Are you sure you wanna delete this value&quot;, click Yes &lt;br /&gt;&lt;br /&gt;Now close the registry editor.&lt;br /&gt;&lt;br /&gt;AND NOW YOU ARE DONE THE virus HAD BEEN SUCCESSFULLY REMOVED FROM UR COMPUTER</content><link rel='replies' type='application/atom+xml' href='http://cyberztutorial.blogspot.com/feeds/7561570749061114385/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://cyberztutorial.blogspot.com/2008/11/to-remove-virus-which-bans-orkut.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3812921815264375231/posts/default/7561570749061114385'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3812921815264375231/posts/default/7561570749061114385'/><link rel='alternate' type='text/html' href='http://cyberztutorial.blogspot.com/2008/11/to-remove-virus-which-bans-orkut.html' title='To remove virus which bans orkut'/><author><name>THIEF</name><uri>http://www.blogger.com/profile/02562742835916644821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhW2nZSZ302EnOUf8zLgi7E2LmJa6LNLiwsnknKUF8ty4CI22DVk3BMp9_vL7ZZ_WkL12NChQuBhZx7RLaFhc6R1M1QJb7p3PEV4vKJ_iBg-PR_EXxe-06qXeTdv4rr6Q/s220/Image016.jpg'/></author><thr:total>0</thr:total></entry></feed>