Number Of Sides And Polygons

3 – Triangle.
4 – Square.
5 – Pentagon.
6 – Hexagon.
7 – Heptagon.
8 – Octagon.
9 – Nanogon.
10 – Decagon.
11 – Undecagon. 

                                                    (Source:Internet)

Five Years Plan In India

First Plan – 1951-56.
Second Plan – 1956-71.
Third Plan – 1961-66.
Fourth Plan – 1969-74.
Fifth Plan – 1974-79.
Sixth Plan – 1980-85.
Seventh Plan – 1985-90.
Eight Plan - 1992-97.
Ninth Plan – 1997-2002.
Tenth Plan – 2002-07.
Eleventh Five Year Plan is going now…. 

                                                                   (Source:-Internet)

International Paper Sizes

A series (Millimeter Measurements)
A0 – 841x1189.
A1 – 594x841.
A2 – 420x594.
A3 – 297x420.
A4 – 210x297.
A5 – 148x210.
A6 – 105x148.
A7 – 74x105.
A8 – 52x74.
A9 – 37x52.
A10 – 26x34.


B series
B0 - 1000x1414.
B1 – 707x1000.
B2 – 500x707.
B3 – 353x500.
B4 – 250x353.
B5 – 176x250.
B6 – 125x176.
B7 – 88x125
B8 – 62x88.
B9 – 44x62.
B10 – 31x44.


C series
C0 – 917x1297.
C1 – 648x917.
C2 – 458x648.
C3 – 324x458.
C4 – 229x324.
C5 – 162x229.
C6 – 114x162. 

                                                                                                            (Source :- Internet)

Special Days Of Every Month

January
12 - Vivekanandar’s Birthday, National Youth Day.
14 - Chennai State Changed as Tamil Nadu.
15 - Army Day.
17- M.G. Ramachandran’s Birthday.
23 – Nethaji’s Birthday.
24 -Girl child day ( In India)
25 - National Tourism Day.
26 - India’s Republic Day, International Customs Day.
30 - World Leprosy Eradication Day, Martyrs’s Day.

February 
14 -Valentine's day
24 - Central Excise Day.
28 - National Science Day.


March
8 - International Women’s Day.
15 - World Disabled Day, World Consumer Rights Day.
18 - Ordanance Factories Day.
21 - World Forestry Day, International day for elimination of Racial Discrimination.
22 - World Day for Water.
23 - World Meterological Day.
24 - World TB day.


April
3 – World Austism Day.
5 – International Day for Mine awarness, s International Maritime Day.
7 – World Health Day.
8 – World Haemophilia Day.
14 – Dr. B. R. Ambedhkar’s Birthday.
18 – World Heritage Day.
21 – National Civil Services Day, Seceretaries Day.
22 – Earth Day.
23 – World Book and Copyright Day.
25 - World Veterinary Day
26 – World Intellectual Property Day.
29 – Tamil Poet Barathidasan’s Birthday.


May
1 – International Labour Day.
3 – Press Freedom Day.
4 – Coal Miners Day.
8 – World Red Cross Day.
9 – world Thalassaemia Day.
11 – National Technology Day.
12 – World Hypertension Day, International Nurses Day.
15 – International Day of the Family.
17 – World Telecommunication Day.
24 – Common Wealth Day.
25 – World Thyroid Day.
31 – Anti-tobacco Day.

  
June
(2nd Sunday) Fathers Day.
 4 - International Day of Innocent Children Victims of Aggression.
5 – World Environment Day.
14 – World Blood Donor Day.
26 - International day against Drug abuse & Illicit Trafficking.
27 - World Diabetes Day.



July
1 – Doctors Day.
6 - World Zoonoses Day.
11 – World Population Day.


August
(1st Sunday) Friendship day.(In India)
1 – World Breast Feeding Day.
6 – Hiroshima Day.
8 – World Senior Citizens Day.
9 – Nagasaki Day, Quit India Day.
15 – India’s Independence Day.
19 – Photography Day.
29 – National Sports Day.



September
5 – Teachers Day.
8 – world Literacy Day.
16 – World Ozone Day.
21 - Alzheimer's Day.
26 - Day of the Deaf.
27 – World Tourism Day.


October
1-International day of the Elderly
3-World Habitat Day.
4 – World Animal Welfare Day.
8 – Indian Airforce Day.
9 – World Post Office Day.
10 – National Post Day.
13-  UN International Day for National disaster reduction.
14- World Standards Day
15 – World Hand Washing Day
15- World White Cane Day( guiding theBlind).
16 – World Food Day.
24- UN Day, World development information Day.
30- World Thrift Day.
November
14 – Children s Day, Diabetes Day.
17 – National Epilepsy Day.
20- Africa Industrialization Day.
22- children s day
29- International Day of Solidarity with Palestinian People.


December
1 – World Aids Day.
4 – Navy Day.
7 – Armed Forces Flag Day.
10 – Human Rights Day.
23- Kisan Divas Farmer's Day.                                                                          (Source:- Internet)

JNTUK (R07) REGULATION 3-2 TEXT BOOKS

Principles of compiler design -A.V. Aho . J.D.Ullman; Pearson Education :-

                                                     DOWNLOAD

Computer Networks_Tanenbaum_4ed :-

                                                     DOWNLOAD

Operating systems by Galvin 5th edition :- 

                                    DOWNLOAD 

Network Security Essentials (Applications and Standards) by William Stalling s, Pearson Education :-

                           DOWNLOAD

JNTUK 3-2 LAB MANUALS

COMPILER DESIGN LAB PROGRAMS MANUAL FOR 3-2 ..

                                                   DOWNLOAD

(or) DOWNLOAD  (Link from prsolutions)

OS LAB PROGRAMS :- 
               
                         DOWNLOAD    (in a single file(.rar))

                              (or)

          1.)  Dead_Lock_Detection.c            Download 
          2.)  Round_Robbin.c                         Download
          3.)  Optimal.c                                    Download
          4.)  LRU.c                                         Download
          5.)  FIFOPG.c                                   Download
          6.)  Singdir.c                                  Download
          7.)  Twolevel.c                                  Download
          8.)  LinkedFile Allocation.c             Download
          9.)  Indexed file Allocation.c           Download
        10.)  Scan.c                                        Download
        11.)  FCFS.c                                       Download
                      

Anti-Spywares

Do you have an anti-spyware program installed on your computer? If your answer is no, then you are under a serious risk of being exposed to thousands of spyware and adware programs across the Internet. Just having an Antivirus installed is not enough! If you are a frequent Internet user then there is a desperate need for you to use a good anti-spyware program to protect your Computer from dangerous threats.
The following are some of the major risks of spywares
1. Spyware programs are designed specifically to monitor and record your behaviors, such as track websites you visit online, or monitor your use of other web-based programs.
2. Hackers mainly use spywares to steal sensitive information such as email passwords and credit card data. So it is a must to have an anti-spyware installed on your computer. Antivirus isn’t just enough today!
3. Spyware is also capable of performing activities such as completely shutting down your computer, or permanently erasing or damaging files. Valuable client files could be destroyed in a blink of an eye, making this type of spyware threat high-risk.
Did you know? Spywares are more dangerous than viruses. So, use a good anti-spyware to avoid the risk of being exposed to spywares.

How to Protect an Email Account from being Hacked



Today in this post I’ll teach you how to protect your email account from being hacked. Nowadays I get a lot of emails where most of the people say “My Email account is hacked please help…”. Now one question which arises in our mind is: “Is it so easy to hack an email account? OR Is it so difficult to protect an email account from being hacked?”. The single answer to these two questions is “Absolutely NOT!”. It is neither easy to hack an email nor difficult to protect an email account from bieng hacked.
 
If this is the case, then what is the reason for many people to lose their accounts?
The answer is very simple. They don’t know how to protect themselves from being hacked! In fact most of the people who lose their email accounts are not the victims of hacking but the victims of Trapping. They lose their passwords not because they are hacked by some expert hackers but they are fooled to such an extent that they themselves give away their password.
Are you confused? If so continue reading and you’ll come to know…
Now I’ll mention some of the most commonly used online scams which fool people and make them lose their passwords. I’ll also mention how to protect your email account from these scams.
 
1. WEBSITE SPOOFING
Website spoofing is the act of creating a website, with the intention of misleading the readers. The website will be created by a different person or organisation (Other than the original) especially for the purposes of cheating. Normally, the website will adopt the design of the target website and sometimes has a similar URL.
For example a Spoofed Website of Yahoo.com appears exactly same as Yahoo Website. So most of the people believe that it is the original site and lose their passwords. The main intention of spoofed websites is to fool users and take away their passwords. For this,the spoofed sites offer fake login pages. These fake login pages resemble the original login pages of sites like Yahoo,Gmail,Orkut etc. Since it resemble’s the original login page people beleive that it is true and give away their username and passwords by trying to login to their accounts.
 
Solution:
  • Never try to login/access your email account from the sites other than the original site.
  • Always type the URL of the site in the address bar to get into the site. Never click on the hyperlink to enter the site.
 
2. BY USING KEYLOGGERS
The other commonly used method to steal password is by using a Keylogger. A Keylogger is nothing but a spyware. The detailed description of keylogger and it’s usage is discussed in the post Hacking an email account. If you read this post you’ll come to know that it is too easy to steal the password using a keylogger program. If you just access your email account from a computer installed with keylogger, you definitely lose your password. This is because the keylogger records each and every keystroke that you type.
 
Solution:
Protecting yourselves from a keylogger scam is very easy.Just install a good anti-spyware program and update it regularly. This keeps your PC secure from a keylogger. Also there is a program called Anti-keylogger which is specially designed to detect and remove keyloggers. You can use this program to detect some stealth keyloggers which remain undetected by many anti-spyware programs.
 
3. ACCESSING YOUR EMAIL ACCOUNT FROM CYBER CAFES
Do you access your email from cyber cafes?  Then definitely you are under the risk of loosing your password.In fact many people lose their email account in cyber cafes. For the owner of the cyber cafe it’s just a cakewalk to steal your password. For this he just need’s to install a keylogger on his computers. So when you login to your email account from this PC, you give away your password to the cafe owner. Also there are many Remote Administration Tools (RATs) which can be used to monitor your browsing activities in real time.
This doesn’t mean that you should never use cyber cafes for browsing the internet. I know, not all the cyber cafe owners will be so wicked but it is recommended not to use cafes for accessing confidential information. If it comes to the matter of security never trust anyone, not even your friend. I always use my own PC to login to my accounts to ensure safety.
So with this I conclude my post and assume that I have helped my readers to protect their email accounts from being hacked. Please pass your comments…

What is Phishing ?


Phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and credit card details, by appearing as a trustworthy entity in an electronic communication. eBay, PayPal and other online banks are common targets. Phishing is typically carried out by email or instant messaging and often directs users to enter details at a website, although phone contact has also been used. Phishing is an example of social engineering techniques used to fool users. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical measures. Recent phishing attempts have targeted the customers of banks and online payment services. Social networking sites such as Orkut are also a target of phishing.
Spoofed/Fraudulent e-mails are the most widely used tools to carry out the phishing attack. In most cases we get a fake e-mail that appears to have come from a Trusted Website . Here the hacker may request us to verify username & password by replaying to a given email address.
TECHNIQUES BEHIND PHISHING ATTACK
1. Link Manipulation
Most methods of phishing use some form of technical deception designed to make a link in an email appear to belong to some trusted organization or spoofed organization. Misspelled URLs or the use of subdomains are common tricks used by phishers, such as this example URL
www.micosoft.com
www.mircosoft.com
www.verify-microsoft.com
instead of www.microsoft.com
2. Filter Evasion
Phishers have used images instead of text to make it harder for anti-phishing filters to detect text commonly used in phishing emails. This is the reason Gmail or Yahoo will disable the images by default for incoming mails.
How does a phishing attack/scam look like?
As scam artists become more sophisticated, so do their phishing e-mail messages and pop-up windows. They often include official-looking logos from real organizations and other identifying information taken directly from legitimate Web sites. Here is an example of how the phishing scam email looks like
Example of a phishing e-mail message, including a deceptive URL address linking to a scam Web site.
To make these phishing e-mail messages look even more legitimate, the scam artists may place a link in them that appears to go to the legitimate Web site (1), but it actually takes you to a phishing site (2) or possibly a pop-up window that looks exactly like the official site.
These copycat sites are also called “spoofed” Web sites. Once you’re at one of these spoofed sites, you may send personal information to the hackers.
How to identify a fraudulent e-mail?
Here are a few phrases to look for if you think an e-mail message is a phishing scam.
“Verify your account.”
Legitimate sites will never ask you to send passwords, login names, Social Security numbers, or any other personal information through e-mail.
“If you don’t respond within 48 hours, your account will be closed.”
These messages convey a sense of urgency so that you’ll respond immediately without thinking.
“Dear Valued Customer.”
Phishing e-mail messages are usually sent out in bulk andoften do not contain your first or last name.
“Click the link below to gain access to your account.”
HTML-formatted messages can contain links or forms that you can fill out just as you’d fill out a form on a Web site. The links that you are urged to click may contain all or part of a real company’s name and are usually “masked,” meaning that the link you see does not take you to that address but somewhere different, usually a scam Web site.
Notice in the following example that resting the mouse pointer on the link reveals the real Web address, as shown in the box with the yellow background. The string of cryptic numbers looks nothing like the company’s Web address, which is a suspicious sign.
So the Bottom line to defend from phishing attack is
1. Never assume that an email is valid based on the sender’s email address.
2. A trusted bank/organization such as paypal will never ask you for your full name and password in a PayPal email.
3. An email from trusted organization will never contain attachments or software.
4. Clicking on a link in an email is the most insecure way to get to your account.

10 Tips for Online Security

 With the sudden rise in the Internet usage across the globe over the past few years, there has also been a rise in the amount of online scams and frauds. Today most of the Internet users are unaware of the most prevailing online threats which pose a real challenge for their safe Internet usage. As a result, Online Security has become a questionable factor for the most Internet users. However it is still possible to effectively combat online insecurity provided that the users are well aware of the common scams and frauds and know how to protect themselves. A study shows that over 91% of the Internet users are unaware of the online scams and are worried about their security. Well if you are one among those 91% then here is a list of 10 tips to ensure your total online security.
1. Always install a good antivirus software and keep it up-to-date. Also install a good anti-spyware to keep your PC away from spywares. Click Here for a list of recommended anti-spyware softwares.
2. Always visit known and trusted websites. If you are about to visit an unknown website, ensure that you do not click on suspectable links and banners.
3. Perform a virus scan on the files/email attachments that you download before executing them.
4. Regularly Update your operating system and browser software. For a better security it is recommended that you surf the Internet through the latest version of your browser program.
5. Never share your password (email, bank logins etc.) with any one for any reason. Choose a strong password (A blend of alphanumeric+special symbols) and change it regularly, eg. every 3 months. Avoid using easy-to-guess passwords. (ex. pet’s name or kid’s name)
6. Always type the URL of the website in your browser’s address bar to enter the login pages. For ex. To login to your Gmail account type http://mail.google.com
7. Before you enter your password on any login page, ensure that you see https instead of http. ex. https://mail.google.com instead of http://mail.google.com. HTTPS protocol implements SSL (Secure Sockets Layer) and provide better security than a normal HTTP. For more information on HTTPS and SSL see Know More About Secure Sockets Layer (SSL).
8. Beware of phishing emails! Do not respond to any email that request you to update your login details by clicking on a link in the body of the email. Such links can lead to Fake Login Pages (Spoofed Pages). For more information on phishing refer What is Phishing?. Also refer How to Protect an Email Account from being Hacked.
9. Always hit the logout button to close your login session rather than abruptly terminating the browser window. Also clear your web browser caches after every session to remove the temporary files stored in the memory and hard disk of your PC.
10. Avoid (Stop) using any public computers or computers in the Internet cafes to access any sensitive/confidential information. Also avoid such computers to login to your email/bank accounts. You cannot be sure if any spyware, keystroke-logger, password-sniffer and other malicious programs have not been installed on such a PC.
By following the above 10 tips your online security can be guaranteed upto 90%. I hope this will help my readers for keeping themselves safe from any of the online insecurities. Cheers! Pass your comments.

10 Tips to Avoid Getting Adware

10 Tips to Avoid Getting Ad ware

Adware, malware, spyware and viruses can bring your system to its knees. They are detrimental, lowering the performance of your computer. You might need to replace data. You might lose unique files. Keep the nasties away from your computer using these ten simple tips.
1. Use Firefox: Internet Explorer is the most popular browser on the market, controlling over 50% of the market share. The virus and adware creators specifically look for exploitable vulnerabilities within IE because they know that they will receive the best return on investment. Your switch to Firefox prevents some adware from infecting your machine.

2. Scan your PC once a week: Sometimes adware programmers take a sneaky approach. They will set up their programs to run quietly in the background to spy upon your activities. This once a week scan is necessary to remove any of those sneaky bugs.

3. Download from known sites: New sites for installing adware are popping up all the time. If you find something that you want to download, make sure that it is from a known site. A company like Amazon will not steer you wrong, but Bob’s House of Wares might be a little less trustable. If you are not sure whether you can trust a site, perform a quick search.

4. Install Adaware: Ad-Aware is the most popular free adware removal program on the market. It detects, quarantines and removes adware. It searches for other programs which may have been installed, highlighting them in an easy to use interface. This program does not have an anti-virus attached.

5. Do not click on unsolicited email: You are constantly receiving offers to increase this or improve that through unsolicited email. Your curiosity may be killing you, but don’t click on these emails. They accept your click as permission to install adware, spyware and malware on your PC.

6. Install Antivirus software: Installing two programs for virus and adware protection is a smart idea. It caters to the strengths of each program, increasing the overall strength of your antiadware and antiviral campaign. Some of the best antivirus software is free, providing real time protection. Programs to look at would be Avast Antivir and AVG.

7. Don’t install toolbars: Even some reputable sites install custom toolbars. They slow your system down and collect information about your surfing habits. While a toolbar might offer some perks, it may also diminish your experience by dragging your system to a halt. Toolbars from less reputable places install adware and sometimes infect your system outright.

8. Look at your task manager: If anything seems out of place with your computer, take a look at your task manager. This tells you about all of the programs and processes which are running on your computer. Examine the processes tab for anything which you don’t immediately recognize. Perform a web search for unfamiliar processes.

9. Do not click on popups: Clicking on a popup usually spells certain doom for your computer. It opens the door for the viruses and adware that want to infect your machine, telling these malicious applications to make themselves at home. Stay away from those constantly advertised screensavers and icons.

10. Trust your gut: If you don’t feel right about a site, don’t go there. If you are receiving warnings from the antivirus and antiadware programs which you’ve installed, don’t go there. If you don’t like the layout of a site, don’t go there. Trust your instincts about sites.
With proper vigilance, you can keep aggravating adware, spyware and malware from your machine. Trust your instincts. Install Ad-Aware and an antivirus program. Play it safe. The care you spend in preventing adware from infecting your machine can save money and time.
This article was added by James Adams who is currently a writer and analyst at a supplier of printer cartridges and franking machine supplies. Much of his writing is about using advertising and productivity to help growth.
                                                                                                                   Courtesy:- Internet

WEB-LINKS

Hai Folks,
Are you interested in knowing about the Guiness Book of records??

Just click here

http://www.worldamazingrecords.com/

http://www.guinnessworldrecords.com/

COMMAND PROMPT COMMANDS

MS DOS COMMAND PROMPT COMMANDS:-


A ADDUSERS Add or list users to/from a CSV file
   ARP      Address Resolution Protocol
   ASSOC    Change file extension associations•
   ASSOCIAT One step file association
   ATTRIB   Change file attributes
b
   BOOTCFG  Edit Windows boot settings
   BROWSTAT Get domain, browser and PDC info
c
   CACLS    Change file permissions
   CALL     Call one batch program from another•
   CD       Change Directory - move to a specific Folder•
   CHANGE   Change Terminal Server Session properties
   CHKDSK   Check Disk - check and repair disk problems
   CHKNTFS  Check the NTFS file system
   CHOICE   Accept keyboard input to a batch file
   CIPHER   Encrypt or Decrypt files/folders
   CleanMgr Automated cleanup of Temp files, recycle bin
   CLEARMEM Clear memory leaks
   CLIP     Copy STDIN to the Windows clipboard.
   CLS      Clear the screen•
   CLUSTER  Windows Clustering
   CMD      Start a new CMD shell
   CMDKEY   Manage stored usernames/passwords
   COLOR    Change colors of the CMD window•
   COMP     Compare the contents of two files or sets of files
   COMPACT  Compress files or folders on an NTFS partition
   COMPRESS Compress individual files on an NTFS partition
   CON2PRT  Connect or disconnect a Printer
   CONVERT  Convert a FAT drive to NTFS.
   COPY     Copy one or more files to another location•
   CSCcmd   Client-side caching (Offline Files)
   CSVDE    Import or Export Active Directory data 
d
   DATE     Display or set the date•
   DEFRAG   Defragment hard drive
   DEL      Delete one or more files•
   DELPROF  Delete NT user profiles
   DELTREE  Delete a folder and all subfolders
   DevCon   Device Manager Command Line Utility 
   DIR      Display a list of files and folders•
   DIRUSE   Display disk usage
   DISKCOMP Compare the contents of two floppy disks
   DISKCOPY Copy the contents of one floppy disk to another
   DISKPART Disk Administration
   DNSSTAT  DNS Statistics
   DOSKEY   Edit command line, recall commands, and create macros
   DSACLs   Active Directory ACLs
   DSAdd    Add items to active directory (user group computer) 
   DSGet    View items in active directory (user group computer)
   DSQuery  Search for items in active directory (user group computer)
   DSMod    Modify items in active directory (user group computer)
   DSMove   Move an Active directory Object
   DSRM     Remove items from Active Directory
e
   ECHO     Display message on screen•
   ENDLOCAL End localisation of environment changes in a batch file•
   ERASE    Delete one or more files•
   EVENTCREATE Add a message to the Windows event log
   EXIT     Quit the current script/routine and set an errorlevel•
   EXPAND   Uncompress files
   EXTRACT  Uncompress CAB files
f
   FC       Compare two files
   FIND     Search for a text string in a file
   FINDSTR  Search for strings in files
   FOR /F   Loop command: against a set of files•
   FOR /F   Loop command: against the results of another command•
   FOR      Loop command: all options Files, Directory, List•
   FORFILES Batch process multiple files
   FORMAT   Format a disk
   FREEDISK Check free disk space (in bytes)
   FSUTIL   File and Volume utilities
   FTP      File Transfer Protocol
   FTYPE    Display or modify file types used in file extension associations•
g
   GLOBAL   Display membership of global groups
   GOTO     Direct a batch program to jump to a labelled line•
   GPUPDATE Update Group Policy settings
h
   HELP     Online Help
i
   iCACLS   Change file and folder permissions
   IF       Conditionally perform a command•
   IFMEMBER Is the current user in an NT Workgroup
   IPCONFIG Configure IP
k
   KILL     Remove a program from memory
l
   LABEL    Edit a disk label
   LOCAL    Display membership of local groups
   LOGEVENT Write text to the NT event viewer
   LOGMAN   Manage Performance Monitor
   LOGOFF   Log a user off
   LOGTIME  Log the date and time in a file
m
   MAPISEND Send email from the command line
   MBSAcli  Baseline Security Analyzer. 
   MEM      Display memory usage
   MD       Create new folders•
   MKLINK   Create a symbolic link (linkd)
   MODE     Configure a system device
   MORE     Display output, one screen at a time
   MOUNTVOL Manage a volume mount point
   MOVE     Move files from one folder to another•
   MOVEUSER Move a user from one domain to another
   MSG      Send a message
   MSIEXEC  Microsoft Windows Installer
   MSINFO   Windows NT diagnostics
   MSTSC    Terminal Server Connection (Remote Desktop Protocol)
   MUNGE    Find and Replace text within file(s)
   MV       Copy in-use files
n
   NET      Manage network resources
   NETDOM   Domain Manager
   NETSH    Configure Network Interfaces, Windows Firewall & Remote access
   NETSVC   Command-line Service Controller
   NBTSTAT  Display networking statistics (NetBIOS over TCP/IP)
   NETSTAT  Display networking statistics (TCP/IP)
   NOW      Display the current Date and Time 
   NSLOOKUP Name server lookup
   NTBACKUP Backup folders to tape
   NTRIGHTS Edit user account rights
o
   OPENFILES Query or display open files
p
   PATH     Display or set a search path for executable files•
   PATHPING Trace route plus network latency and packet loss
   PAUSE    Suspend processing of a batch file and display a message•
   PERMS    Show permissions for a user
   PERFMON  Performance Monitor
   PING     Test a network connection
   POPD     Restore the previous value of the current directory saved by PUSHD•
   PORTQRY  Display the status of ports and services
   POWERCFG Configure power settings
   PRINT    Print a text file
   PRINTBRM Print queue Backup/Recovery
   PRNCNFG  Display, configure or rename a printer
   PRNMNGR  Add, delete, list printers set the default printer
   PROMPT   Change the command prompt•
   PsExec     Execute process remotely
   PsFile     Show files opened remotely
   PsGetSid   Display the SID of a computer or a user
   PsInfo     List information about a system
   PsKill     Kill processes by name or process ID
   PsList     List detailed information about processes
   PsLoggedOn Who's logged on (locally or via resource sharing)
   PsLogList  Event log records
   PsPasswd   Change account password
   PsService  View and control services
   PsShutdown Shutdown or reboot a computer
   PsSuspend  Suspend processes
   PUSHD    Save and then change the current directory•
q
   QGREP    Search file(s) for lines that match a given pattern.
r
   RASDIAL  Manage RAS connections
   RASPHONE Manage RAS connections
   RECOVER  Recover a damaged file from a defective disk.
   REG      Registry: Read, Set, Export, Delete keys and values
   REGEDIT  Import or export registry settings
   REGSVR32 Register or unregister a DLL
   REGINI   Change Registry Permissions
   REM      Record comments (remarks) in a batch file•
   REN      Rename a file or files•
   REPLACE  Replace or update one file with another
   RD       Delete folder(s)•
   RMTSHARE Share a folder or a printer
   ROBOCOPY Robust File and Folder Copy
   ROUTE    Manipulate network routing tables
   RUNAS    Execute a program under a different user account
   RUNDLL32 Run a DLL command (add/remove print connections)
s
   SC       Service Control
   SCHTASKS Schedule a command to run at a specific time
   SCLIST   Display NT Services
   SET      Display, set, or remove environment variables•
   SETLOCAL Control the visibility of environment variables•
   SETX     Set environment variables permanently
   SFC      System File Checker 
   SHARE    List or edit a file share or print share
   SHIFT    Shift the position of replaceable parameters in a batch file•
   SHORTCUT Create a windows shortcut (.LNK file)
   SHOWGRPS List the NT Workgroups a user has joined
   SHOWMBRS List the Users who are members of a Workgroup
   SHUTDOWN Shutdown the computer
   SLEEP    Wait for x seconds
   SLMGR    Software Licensing Management (Vista/2008)
   SOON     Schedule a command to run in the near future
   SORT     Sort input
   START    Start a program or command in a separate window•
   SU       Switch User
   SUBINACL Edit file and folder Permissions, Ownership and Domain
   SUBST    Associate a path with a drive letter
   SYSTEMINFO List system configuration
t
   TASKLIST List running applications and services
   TASKKILL Remove a running process from memory
   TIME     Display or set the system time•
   TIMEOUT  Delay processing of a batch file
   TITLE    Set the window title for a CMD.EXE session•
   TLIST    Task list with full path
   TOUCH    Change file timestamps    
   TRACERT  Trace route to a remote host
   TREE     Graphical display of folder structure
   TYPE     Display the contents of a text file•
   TypePerf Write performance data to a log file
u
   USRSTAT  List domain usernames and last login
v
   VER      Display version information•
   VERIFY   Verify that files have been saved•
   VOL      Display a disk label•
w
   WHERE    Locate and display files in a directory tree
   WHOAMI   Output the current UserName and domain
   WINDIFF  Compare the contents of two files or sets of files
   WINMSD   Windows system diagnostics
   WINMSDP  Windows system diagnostics II
   WINRM    Windows Remote Management
   WINRS    Windows Remote Shell
   WMIC     WMI Commands
x
   XCACLS   Change file and folder permissions
   XCOPY    Copy files and folders
   ::       Comment / Remark•
Courtesy:- www.ss64.com/nt

Student Resource: COOL TRICKZZ

Student Resource: COOL TRICKZZ

COOL TRICKZZ

How to change your folder background:-

Howdy,In this post I will show you, How to make your windows attractive.
So Follow these steps and get result..

Step 1: Have the Folder you want to put the background on open!

Step 2: Open up Notepad, then simply paste in this code:
[{BE098140-A513-11D0-A3A4-00C04FD706EC}]
iconarea_image=***Picture Location Here!***\***Name of File!***

Step 3: Go to ur picture (the picture you want to use!) and right click and select
properties and find the file location for example lets say my file is in "my hardrive" it
would be located at "C:\\" understand? copy the location!

Step 4: Now go back to ur text document (notepad) and where it says ***Picture
Location Here!*** paste the location...u copied in the previus step!

Step 5: Now after u've done that where it says ***Name of File!*** type the name
of the file including the .jpg .bmp .bip. jpeg etc

Step 6: Save the text document as "desktop.ini" be sure to remember the .ini
extension! click Save as "All Files" not "Text Document" and save the document in the
folder where u want the background to be!

Now just close the folder and open it again it should show the picture as a
background!(Only for Windows XP)
---------------------------------------------------------------------------------------------------------------------------------
How to chat with a friend using Command prompt:-

Hiii....In this section I will discuss how to chat using cmd.Its seems very intresting..CHAT using cmd....sob..sob,but its really cool way to chat wid friends.So letswe start the HACK:-
1) All you need is your friend's IP Address and your Command Prompt.

2) Open Notepad and write this code as it is.....!

@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A

3) Now save this as "Messenger.Bat".

4) Open Command Prompt.
5) Drag this file (.bat file) over to Command Prompt and press Enter.
6) You would then see something like this:

MESSENGER
User:_

7) Now, type the IP Address of the computer you want to contact and press enter
Let say IP address of ur freind is:127.0.01
then,You will see something like this:

MESSENGER
User:127.0.01

8) Now all you need to do is type your message and press Enter.

Start Chatting.......!

MESSENGER
User:127.0.0.1
Messege:Hi...!.How are you...??
--------------------------------------------------------------------------------------------------------------------------------- 
MAKE YOUR KEYBOARD LIGHTS DO DISCO:- 

This trick just makes your keyboard lights go crazy and do disco. LoL.
The script I’m sharing with you, when executed makes your Caps, Num and Scroll Lock’s light flash in a cool rhythmic way!

1.This piece of code makes ur keyboard a live disco..

Set wshShell =wscript.CreateObject(“WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “{CAPSLOCK}”
wshshell.sendkeys “{NUMLOCK}”
wshshell.sendkeys “{SCROLLLOCK}”
loop

2.This one makes it looks like a chain of light….


Set wshShell =wscript.CreateObject(“WScript.Shell”)
do
wscript.sleep 200
wshshell.sendkeys “{CAPSLOCK}”
wscript.sleep 100
wshshell.sendkeys “{NUMLOCK}”
wscript.sleep 50
wshshell.sendkeys “{SCROLLLOCK}”
loop

Instructions:

  • paste any of the two above codes in notepad
  • Save as “AnyFileName”.vbs
  • Run the file
  • To stop, launch task manager and then under “Processes” end “wscript.exe”
I hope u would like it..
----------------------------------------------------------------------------------------------------------

INTERNET SECURITY

What is captcha and how it works?
This is really interesting Topic about Internet Security "The Captcha".



CAPTCHA or Captcha (pronounced as cap-ch-uh) which stands for “Completely Automated Public Turing test to tell Computers and Humans Apart” is a type of challeng-response test to ensure that the response is only generated by humans and not by a computer. In simple words, CAPTCHA is the word verification test that you will come across the end of a sign-up form while signing up for Gmail or Yahoo account. The following image shows the typical samples of CAPTCHA.
 



Almost every Internet user will have an experience of CAPTCHA in their daily Internet usage, but only a few are aware of what it is and why they are used. So in this post you will find a detailed information on how CAPTCHA works and why they are used.
 

What Purpose does CAPTCHA Exactly Serve?

CAPTCPA is mainly used to prevent automated software (bots) from performing actions on behalf of actual humans. For example while signing up for a new email account, you will come across a CAPTCHA at the end of the sign-up form so as to ensure that the form is filled out only by a legitimate human and not by any of the automated software or a computer bot. The main goal of CAPTCHA is to put forth a test which is simple and straight forward for any human to answer but for a computer, it is almost impossible to solve.
 

What is the Need to Create a Test that Can Tell Computers and Humans Apart?

For many the CAPTCHA may seem to be silly and annoying, but in fact it has the ability to protect systems from malicious attacks where people try to game the system. Attackers can make use of automated softwares to generate a huge quantity of requests thereby causing a high load on the target server which would degrade the quality of service of a given system, whether due to abuse or resource expenditure. This can affect millions of legitimate users and their requests. CAPTCHAs can be deployed to protect systems that are vulnerable to email spam, such as the services from Gmail, Yahoo and Hotmail.
 

Who Uses CAPTCHA?

CAPTCHAs are mainly used by websites that offer services like online polls and registration forms. For example, Web-based email services like Gmail, Yahoo and Hotmail offer free email accounts for their users. However upon each sign-up process, CAPTCHAs are used to prevent spammers from using a bot to generate hundreds of spam mail accounts.
 

Designing a CAPTCHA System

CAPTCHAs are designed on the fact that computers lack the ability that human beings have when it comes to processing visual data. It is more easily possible for humans to look at an image and pick out the patterns than a computer. This is because computers lack the real intelligence that humans have by default. CAPTCHAs are implemented by presenting users with an image which contains distorted or randomly stretched characters which only humans should be able to identify. Sometimes characters are striked out or presented with a noisy background to make it even more harder for computers to figure out the patterns.
Most, but not all, CAPTCHAs rely on a visual test. Some Websites implement a totally different CAPTCHA system to tell humans and computers apart. For example, a user is presented with 4 images in which 3 contains picture of animals and one contain a flower. The user is asked to select only those images which contain animals in them. This Turing test can easily be solved by any human, but almost impossible for a computer.
 

Breaking the CAPTCHA

The challenge in breaking the CAPTCHA lies in real hard task of teaching a computer how to process information in a way similar to how humans think. Algorithms with artificial intelligence (AI) will have to be designed in order to make the computer think like humans when it comes to recognizing the patterns in images. However there is no universal algorithm that could pass through and break any CAPTCHA system and hence each CAPTCHA algorithm must have to be tackled individually. It might not work 100 percent of the time, but it can work often enough to be worthwhile to spammers.

MOBILE HACKING

How to call your friends with their own number...

Howdy,In this post I am going to tell you about a cOOl Trick.

"How to call your friends with their own number"

with useful prank to confuse your friends. With this mobile hack, you can call your friends with their own mobile number… meaning by, they will see their own number calling them. Just follow the guidelines I have mentioned in this mobile hack post.

 1. Go to http://www.mobivox.com and register there for free account.

2. During registration, remember to insert Victim mobile number in “Phone number” field as shown below.


3. Complete registration and confirm your email id and then login to your account. Click on “Direct WebCall”


4. You will arrive at page shown below. In “Enter a number” box, select your country and also any mobile number(you can enter yours). Now, simply hit on “Call Now” button to call your friend with his own number.
5. That’s it. Your friend will be shocked to see his own number calling him.


Thus, use this to surprise and shock your friends. This mobile hack is free. So, you don’t need to lose a buck. Simply register and you’ll be able to perform this mobile hack. This mobile hack is available for almost all countries and all cell phones network providers
----------------------------------------------------------------------------------------------------------
HOW TO MAKE A PHONE CALL USING YAHOO MESSENGER 100% FREE OF COST:-

1. Download the latest Yahoo Messenger hope it is available with every one..

2.Type the Following Number +18003733411 in the Red Box Shown Below and Press Enter.


3.After Pressing Enter a small Window will open showing Connecting a Call to that number . Shown Below



4. Now Listen the Call And Wait Untill She Say "Free Calls" .

5. When she Says Free Calls Use Your Microphone and Say Free Calls (Don't forgot to unmute your microphone Voice in Volume Properties By Right Click on Volume Icon in your Task Bar and then click on properties and then Advanced and then unclick mute button under Microphone).

6. Now Click on the Dialpad As Shown Below To dial the Number.

7. Now The Dial Pad Opens Like Below
8.Now Dial The Number In format Country code followed by friends number whom you want to call.
Example : 919457196088 where 91 is country code for India and 9457196088 is phone number.

After dialing wait 2 sec for phone call to connect . After that You can call Upto 5 minutes.  
--------------------------------------------------------------------------------------------------------------
NOKIA SECRET CODES:-

*** WARNING: Using secret codes may be harmful to your phone and result in disabling or worse. Use these codes at your own discretion, we accept no responsiblility for blocked pones while using these codes!!!


IMEI Number
*#06# Cells Identity Code (IMEI = International Mobile Equipment Identity)
XXXXXX XX XXXXXX X
TAC FAC SNR SP

TAC = Type Approval Code (first 2 digits = country code of the approval-country )
FAC = Final Assembly Code: (01,02 = AEG)
(10,20 Nokia)
(40,41,44 Siemens)
(30 Ericsson)
(50 Bosch)
(51 Sony,Siemens,Ericsson)
(60 Alcatel)
(65 AEG)
(70 Sagem)
(75 Dancall)
(80 Philips)
(85 Panasonic)

SNR = Serial Nr.
SP = Spare (always "0")

Software Version
*#0000# shows the software version 


Signal Processing 

*3370# - Enchanced full Rate Codec (EFR) activation. It will automatically restart.
#3370# - Enchanced full Rate Codec (EFR) deactivation
*4720# - Half Rate Codec activation. It will automatically restart.
#4720# - Half Rate Codec deactivation 


Enchanced Full Rate will give you much better sound quality when you enable it. The new Enhanced Full Rate CODEC adopted by GSM uses the ASELP (AlgebraicCode Excitation Linear Prediction) compression technology. This technology allows for much great voice quality in the same number of bits as the older Full Rate CODEC. The older technology was called LPC-RPE (Linear Prediction Coding with Regular Pulse Excitation). Both operate at 13 kilobits.(but you take up more space on the network, so they can charge you more) - Talk-time is reduced with about 5%



Sim Clock Stopping 


*#746025625#
[*#sim0clock#]
Checks if the sim clock can be stopped. Sim clock stop is a kind of stand-by mode which will save battery time. This code doesn't work with software version 4.59.
It will tell you if it can be stopped or not.


Warrenty Menu 


*#92702689# takes you to a secret menu with 6 choices:
[*#war0anty#]
1. Displays Serial Number.
2. Displays the Month and Year of Manufacture (0997).
3. Displays (if there) the date where the phone was purchased (MMYY).
4. Displays the date of the last repairment - if found (0000).
5. Makes you capable of transferring user data if you have the gear for it.
6. Shows how long the phone has been used to talk. This counter is not reset by when you "clear timers" like the counters in the call register.


Bypass the SP lock With a Nokia 16xx/21xx/31xx/51xx/81xx 

 
1. Insert SIM card of different provider.
2. Turn on the phone and press the UP VOLUME key for 3 sec.
Then release it and the phone says PIN CODE?
3. Press the "C" key.
4. Then Press * and wait until it disappears and appears again, then press * one more time and 04*PIN*PIN*PIN#


Nokia Speed Trap Detector Urban Legend spread by Nokia Engineers ;^) 


The settings for radar speed traps detector. Your Nokia cell phone can be programmed to pick up radar speed traps, when programmed your cell phone picks up the radar and alerts you on the message alert tone. ( Doesn't work with Nokia 7110! )
1. Enter your menu
2. Select settings
3. Select security settings
4. Select closed user group
5. Select on
6. Enter 00000
7. Press ok
8. Clear back to normal, within a few seconds your phone will display a radar sign with five zero's next to it. It is now activated. 


Unfortunately only Nokia phones have this function. The Cell Phone info display needs to be de-activated. Settings -> Phone Settings -> Cell Info display. Each time you turn off your phone, or even each time you loose contact with your carrier, you'll have to activate it again... It is done using steps 1 through 5 above, but the number (00000) will be already on the field as a default. 
------------------------------------------------------------------------------------------------------------------------------
HOW TO SPY ON CELL PHONES:-
 
 
Need to spy on a cell phone? Do you want to secretly spy on SMS, calls, GPS locations and other confidential info of your child’s or spouse’s cell phone? Well here is a simple and foolproof solution to spy on cell phones with the World’s Most Powerful Cell Phone Spy software from SpyEra!

Spy Phone GOLD (Click on the link to visit Spy-Era Homepage)

Download Spy Phone GOLD software directly onto your mobile phone and receive copies of SMS, Call Logs, Emails, Locations and also listen to live conversations on the target cell phone within minutes. Spy Phone GOLD is the best Cell Phone Spy software of it’s kind. Beware of counterfeit spy softwares on the market, buy original and genuine cell phone spy software from SpyEra.

Spy Phone GOLD Top Features:
  • Call Interception – Listen to the actual calls LIVE on the target cell phone
  • Environment Listening – Make a spy call to the target phone running SPY PHONE and listen in to the phone’s surroundings.
  • SMS Logging – Records both incoming & outgoing SMS
  • SIM Change Notification – Get instant notification via SMS when the target cell phone changes it’s SIM
  • Remote Control – Send secret SMS to the target phone to control all functions
  • Spy from any location accross the world
  • 100% Undetectable
Spy Phone GOLD is the only cell phone spy software to offer a wide range of features which is 100% undetectable.

How it Works?
 
The working of Spy Phone GOLD is very simple and needs no extra knowledge to install and use.
Step 1- After you purchase Spy Phone GOLD, you can directly download the spy software onto the target cell phone and installation takes only a few minutes (Approx. 10 Min). No More physical access to the cell phone is required after installation!
Step 2- After installation, SPY Phone secretly records events that happen on the target phone and delivers this information to a web account, where you can view these reports 24×7 from any Internet enabled computer or mobile phone.

Compatible Cell Phones
Spy Phone is fully compatible with the following mobile phones
  1. BlackBerry Phones
  2. Android Phones
  3. Apple iPhones
  4. Windows Mobile Phones
  5. Symbian OS 9.x and 8.x phones
Click Here for the Complete List of Compatible Phones.

Why Spy Phone GOLD?
There exists many cell phone spy softwares on the market and hence people often get confused about which cell phone spy software to go for. To make this job simpler for you we personally tested some of the top cell phone spy softwares and based on the results we conclude Spy Phone GOLD as be the best one.
Spy Phone GOLD is one of the best and award winning cell phone spy software on the market with an affordable price. Spy Phone GOLD needs no extra knowledge to install/use and hence it becomes just a cakewalk to spy on your favorite cell phone! Today with an excessive usage of cell phones by many teenagers it becomes necessary for their parents to perform cell phone spying.

Awards for Spy Phone GOLD



So what are you waiting for? If you’re really serious to spy on a cell phone then Spy Phone GOLD is for you. Go grab Spy Phone GOLD now and expose the truth.

How to test working of your Anti-virus

Have you ever wondered how to test your Anti virus software to ensure it’s proper working? Well here is a quick and easy way to test your anti virus. The process is called EICAR test which will work on any anti virus and was developed by European Institute of Computer Antivirus Research. This process can be used by people, companies and antivirus programmers to test the proper functioning of the anti virus/antimalware software without having to deal with the real computer virus which can cause damage to the computer. Here is a step-by-step procedure to test your antivirus.

1. Open a notepad (New Text Document.TXT) and copy the following code exactly onto it, and save the notepad.
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*

2. Rename the file from New Text Document.TXT to myfile.com

3. Now run the anti virus scan on this myfile.com file.

If the anti virus is functioning properly on your computer, then it should generate a warning and immediately delete the file upon scanning. Otherwise you may have to re-install your antivirus.

NOTE: Most anti virus will pop-out a warning message in the Step-1 itself.

You can also place the myfile.com file in a ZIP or RAR file and run a scan on it so as to ensure whether your anti virus can detect the test string in the compressed archive. Any anti virus when scanning this file will respond exactly as it will do for a genuine virus/malicious code. This test will cause no damage to your computer even though the anti virus will flag it as a malicious script. Hence it is the safest method to test the proper functioning of any anti virus.

How to hack an administrator account of a remote computer

Sometimes your want some data from your freind pc and you dont know his/her windows password and at that situtions your freind is also be note there then what should you do??? feel helpless,So never feel helpless because I am with you and I have Solution of your problem.I will show you how to grab into your friend pc wiyhout knowing password....
Trick 1.
1.Strat the pc and pressing F8 button when booting started then you will see some boot options click on SAFE MODE.
2.In Safe mode Login with Administrator account to computer.
3.Now go to CONTROL PANEL and go to USER ACCOUNT click on your existing user account and you will see option TYPE NEW PASSWORD type new password in this field.
4.Now start window normally with your user account and enter renewed password you will be in your friends user account.
Trick 2.
1.Go to run type CMD in it and press enter.
2. in command prompt window type:-
net user aaccount-name desired password.
eg:-
net user hp ******
press enter password will be changed.
They are ordinary tricks for hacking windows password.Now I will show how to crack windows password of secured user accounts.
In case of secured account you will not grab into Administartor account because it is disable or password protected and When you trying to change password using "net user" command you will see an error "Access is denied". then what will we do,Here's the solution-
Trick 3.
1.Run cmd screen type eventvwr and delete an entry of that error event.
2.After deleting the error event now you will run net user command in cmd and will change password.