23 Ways To Boost Xp

Since defragging the disk won't do much to improve Windows XP performance, here are 22 suggestions that will. Each can enhance the performance and reliability of your customers' PCs. Best of all, most of them will cost you nothing.

1.) To decrease a system's boot time and increase system performance, use the money you save by not buying defragmentation software -- the built-in Windows defragmenter works just fine -- and instead equip the computer with an Ultra-133 or Serial ATA hard drive with 8-MB cache buffer.

2.) If a PC has less than 512 MB of RAM, add more memory. This is a relatively inexpensive and easy upgrade that can dramatically improve system performance.

3.) Ensure that Windows XP is utilizing the NTFS file system. If you're not sure, here's how to check: First, double-click the My Computer icon, right-click on the C: Drive, then select Properties. Next, examine the File System type; if it says FAT32, then back-up any important data. Next, click Start, click Run, type CMD, and then click OK. At the prompt, type CONVERT C: /FS:NTFS and press the Enter key. This process may take a while; it's important that the computer be uninterrupted and virus-free. The file system used by the bootable drive will be either FAT32 or NTFS. I highly recommend NTFS for its superior security, reliability, and efficiency with larger disk drives.

4.) Disable file indexing. The indexing service extracts information from documents and other files on the hard drive and creates a "searchable keyword index." As you can imagine, this process can be quite taxing on any system.

The idea is that the user can search for a word, phrase, or property inside a document, should they have hundreds or thousands of documents and not know the file name of the document they want. Windows XP's built-in search functionality can still perform these kinds of searches without the Indexing service. It just takes longer. The OS has to open each file at the time of the request to help find what the user is looking for.

Most people never need this feature of search. Those who do are typically in a large corporate environment where thousands of documents are located on at least one server. But if you're a typical system builder, most of your clients are small and medium businesses. And if your clients have no need for this search feature, I recommend disabling it.

Here's how: First, double-click the My Computer icon. Next, right-click on the C: Drive, then select Properties. Uncheck "Allow Indexing Service to index this disk for fast file searching." Next, apply changes to "C: subfolders and files," and click OK. If a warning or error message appears (such as "Access is denied"), click the Ignore All button.

5.) Update the PC's video and motherboard chipset drivers. Also, update and configure the BIOS. For more information on how to configure your BIOS properly, see this article on my site.

6.) Empty the Windows Prefetch folder every three months or so. Windows XP can "prefetch" portions of data and applications that are used frequently. This makes processes appear to load faster when called upon by the user. That's fine. But over time, the prefetch folder may become overloaded with references to files and applications no longer in use.

7.) Once a month, run a disk cleanup. Here's how: Double-click the My Computer icon. Then right-click on the C: drive and select Properties. Click the Disk Cleanup button -- it's just to the right of the Capacity pie graph -- and delete all temporary files.

8.) In your Device Manager, double-click on the IDE ATA/ATAPI Controllers device, and ensure that DMA is enabled for each drive you have connected to the Primary and Secondary controller. Do this by double-clicking on Primary IDE Channel. Then click the Advanced Settings tab. Ensure the Transfer Mode is set to "DMA if available" for both Device 0 and Device 1. Then repeat this process with the Secondary IDE Channel.

9.) Upgrade the cabling. As hard-drive technology improves, the cabling requirements to achieve these performance boosts have become more stringent. Be sure to use 80-wire Ultra-133 cables on all of your IDE devices with the connectors properly assigned to the matching Master/Slave/Motherboard sockets. A single device must be at the end of the cable; connecting a single drive to the middle connector on a ribbon cable will cause signaling problems. With Ultra DMA hard drives, these signaling problems will prevent the drive from performing at its maximum potential. Also, because these cables inherently support "cable select," the location of each drive on the cable is important. For these reasons, the cable is designed so drive positioning is explicitly clear.

10.) Remove all spyware from the computer. Use free programs such as AdAware by Lavasoft or SpyBot Search & Destroy. Once these programs are installed, be sure to check for and download any updates before starting your search. Anything either program finds can be safely removed. Any free software that requires spyware to run will no longer function once the spyware portion has been removed; if your customer really wants the program even though it contains spyware, simply reinstall it. For more information on removing Spyware visit this Web Pro News page.

11.) Remove any unnecessary programs and/or items from Windows Startup routine using the MSCONFIG utility. Here's how: First, click Start, click Run, type MSCONFIG, and click OK. Click the StartUp tab, then uncheck any items you don't want to start when Windows starts. Unsure what some items are? Visit the WinTasks Process Library. It contains known system processes, applications, as well as spyware references and explanations. Or quickly identify them by searching for the filenames using Google or another Web search engine.

12.) Remove any unnecessary or unused programs from the Add/Remove Programs section of the Control Panel.

13.) Turn off any and all unnecessary animations, and disable active desktop. In fact, for optimal performance, turn off all animations. Windows XP offers many different settings in this area. Here's how to do it:

14.) If your customer is an advanced user who is comfortable editing their registry, try some of the performance registry tweaks offered at Tweak XP.

15.) Visit Microsoft's Windows update site regularly, and download all updates labeled Critical. Download any optional updates at your discretion.

16.) Update the customer's anti-virus software on a weekly, even daily, basis. Make sure they have only one anti-virus software package installed. Mixing anti-virus software is a sure way to spell disaster for performance and reliability.

17.) Make sure the customer has fewer than 500 type fonts installed on their computer. The more fonts they have, the slower the system will become. While Windows XP handles fonts much more efficiently than did the previous versions of Windows, too many fonts -- that is, anything over 500 -- will noticeably tax the system.

18.) Do not partition the hard drive. Windows XP's NTFS file system runs more efficiently on one large partition. The data is no safer on a separate partition, and a reformat is never necessary to reinstall an operating system. The same excuses people offer for using partitions apply to using a folder instead. For example, instead of putting all your data on the D: drive, put it in a folder called "D drive." You'll achieve the same organizational benefits that a separate partition offers, but without the degradation in system performance. Also, your free space won't be limited by the size of the partition; instead, it will be limited by the size of the entire hard drive. This means you won't need to resize any partitions, ever. That task can be time-consuming and also can result in lost data.

19.) Check the system's RAM to ensure it is operating properly. I recommend using a free program called MemTest86. The download will make a bootable CD or diskette (your choice), which will run 10 extensive tests on the PC's memory automatically after you boot to the disk you created. Allow all tests to run until at least three passes of the 10 tests are completed. If the program encounters any errors, turn off and unplug the computer, remove a stick of memory (assuming you have more than one), and run the test again. Remember, bad memory cannot be repaired, but only replaced.

20.) If the PC has a CD or DVD recorder, check the drive manufacturer's Web site for updated firmware. In some cases you'll be able to upgrade the recorder to a faster speed. Best of all, it's free.

21.) Disable unnecessary services. Windows XP loads a lot of services that your customer most likely does not need. To determine which services you can disable for your client, visit the Black Viper site for Windows XP configurations.

22.) If you're sick of a single Windows Explorer window crashing and then taking the rest of your OS down with it, then follow this tip: open My Computer, click on Tools, then Folder Options. Now click on the View tab. Scroll down to "Launch folder windows in a separate process," and enable this option. You'll have to reboot your machine for this option to take effect.

Notepad Tricks


These 5 tricks u all might be knowing but found amazing so thought to post it here.
These are some really amazing notepad tricks which you can see in the windows notepad. Check them out right away



Trick 1
* Open Notepad
* Write following line in the notepad.
" this app can break " without the quotes.
* Save this file as xxx.txt
* Close the notepad.
* Open the file again.

Viola!!


Trick 2
* Open Notepad
* Enter four words separated by spaces, wherein the first word has 4 letters, the next two have three letters, and the last word has five letters like: Bush hid the facts
* DON'T hit enter at the end of the line.
* Save the file.
* Close Notepad.
* Reopen Notepad.
* Open the file you just saved.



Trick 3
* Open a note pad
* Type " Bush hid the facts " .
* Save that file,
* Close it
* Again open and see...



Trick 4
NOTEPAD "World Trade Centre Trick".. ::
This would be the most amazing trick amongst all four.
Did you know that the flight number of the plane that had hit WTC ...on
9/11 was Q33N ....Open your Notepad in ur computer and type the flight
number i.e Q33N... Increase the Font Size to 72, Change the Font to
Wingdings. U will be amazed by the findings.



Trick 5
Log trick !! Make your Notepad a diary ::

Sometimes we want to insert current data and time, whenever we open the file in the notepad. If you are a lazy person like me, who don’t like to press F5 whenever you open a notepad. Then here is a trick to avoid this. Just add a .LOG in the first line of your text file and close it. Whenever you open the file with that text in the first line in the notepad, it will insert the current date and time at the end of the file. You can start entering your text after that.

Find And Download Old Version Of Software Quickly

Did you upgrade your software and found that a feature is missing or you are having compatibility problem? Don’t fret yet, you can download the old version of the software from the company’s website. But sometimes they don’t link to old version of the software, in such cases you can try out OldVersion, it is a website dedicated to multiple versions of all software that are old.

Sometimes Old Is Gold.



It contains categories such as Communication, Graphics, Multimedia, Internet, File Sharing, Utilities, Security, Enterprise, and FTP. There is a build-in forum where you can request some old software or just talk about general topics.

According to them,

Sometimes upgrading to a newer version can be a good thing. Other times, your computer may not be compatible with the new version, the new version is bloated, or all the options you liked are no longer available.

And…

OldVersion.com assists computer users who are unable to continually upgrade their computer. Those who find that their machine is not able to run the latest version of a certain application have no choice but to use an old version of the program. Unfortunately, the vast majority of software companies do not offer this opportunity. We are doing our small part to help bridge the digital divide by allowing everyone to enjoy the same software titles regardless of their hardware.

LetMeGoogleThatForYou.com

LetMeGoogleThatForYou.com allows you to enter any search query, then grab the resulting permalink to share it with someone else. For instance, if someone in a forum would ask “What does ’AFAIK’ stand for?”, you could (somewhat impolitely) point them to this search, which would then interactively perform a Google search for “afaik” for the visitor. (Kind of the next version of this even more impolite site… and nope, neither site is an official Google site…)

Important Things to know about Vulnerability Assessment

This article intends to cover following topics about Vulnerability Assessment / Vulnerability analysis in brief.

1. Meaning of vulnerable

2. What is Vulnerability?

3. What is Vulnerability Assessment?

4. Who can exploit Vulnerabilities?

5. Use of Vulnerability Assessment

6. How Vulnerability Assessment is different from Threat analysis?

1. Meaning of vulnerable

Vulnerable means weak and liable to be attacked.

2. What is Vulnerability?

Vulnerability in relation to Information System / Networking is a problematic condition because of which the system can be attacked, exploited and /or compromised. These problematic condition could be:

1. Software /Programming bug
2. Backdoors
3. Unnecessary Open ports
4. Hardware Bugs
5. Improper configuration
6. Improper parameters
7. Improper patch/update management etc.

3. What is Vulnerability Assessment?

Vulnerability Assessment or Vulnerability Analysis is the process of identification, Classification, mapping and rating of vulnerabilities of Information System / Networking System.

4. Who can exploit Vulnerabilities?

Vulnerability can be exploited by Crackers, Some kind of hackers, script kiddies for malicious intent. Some times it is exploited by Penetration Tester/ IS Auditors / Good hackers for the benefit of the general public/group and strengthening / hardening the system.

5. Use of Vulnerability Assessment

Vulnerability Assessment is used for:

1. Risk Rating and Risk Analysis
2. potential Threat Measurement
3. Protect Information assets and their integrity.
4. Prevention and correction tool for Information System

6. How Vulnerability Assessment is different from Threat analysis?

One common question asked is whether Vulnerability Assessment or Vulnerability Analysis is same as Threat Analysis. Answer is "no". No because Threat analysis is generally done after Vulnerability Assessment. Threat analysis is evaluation/examination of threats against detected /known vulnerabilities.

Reversing For Beginners .. A Helping Hand

I thought I would make this post and point out a few very basic resources which are freely available and which may make starting out in the wide world of Reverse Engineering a little easier. The main problem with reversing is that it is a huge and potentially exceptionally complicated subject. The primary choice is which platform you will place the emphasis upon. As I chose Win32 at the outset my experience of Linux reversing is necessarily limited and for the purposes of this post I refer solely to the Windows environment.

Whilst it is repeated time and again, there really is only one sensible place to start in the world of reversing and that is the Lena151 tutorials. Here we have a sequential set of tutorials, written by the same author with increasingly complex topics covered. They are video tutorials and there are 40 in total covering everything from the very basics on up to exceptionally advanced topics. In all my days in the underground scene (20+ years now), this is the most comprehensive set of tutorials I have seen on any subject. Anyone persevering with these from beginning to end will be a moderately accomplished reverse engineer by the end of it.

There are also a number of other beginners tutorials both written and video. You should try any/all of these. In addition to the Lena tutorials which formed the basis of my RE education, I tried to read as many other documents on the same subjects as I could find. The idea being that whilst Lena tends to explain things well, she does occasionally skip things or presume that we the audience have a more advanced knowledge than might be the actual case. So read read read and more read ... and unfortunately what I have discovered is that the more I read, the more I realize I need to read. If you want a never ending always expanding topic to get into, this is it!

In terms of places of interest on the net obviously there are a number but ...

Firstly, absolutely THE site for all things RE. hxxp://www.tuts4you.com/ Tuts4You run by Teddy Rogers (NZ) and the home site of the group Seek N Destroy. This site is, to put it bluntly, absolutely superb. Quite simply, this is the richest and most comprehensive site you are likely to find on any subject, fortunately it just happens to be aimed at Reverse Engineering! Containing tutorials and papers in addition to software, addons plugins .. you name it, Tuts4You has it .. in abundance! If you are looking for OllyDbg or one of the many variants, they will be here. Similarly even plugin for Olly known to man, and probably several that have slipped through time-rifts from the future are collated here. In short if it is Olly related, chances are it`s here. Similarly Immunity and Syser have sections, together with the behemoth of the reversing world, IDA.

Another site which purports to be the (un)official OllyDbg support site is hxxp://www.woodmann.com. This site once again has an extensive forum and wide array of software including a possibly more diverse set of tools, sorted by application type. Certainly this is worth a look and provides a welcome backup to Tuts4You.

OpenRCE is an interesting site dedicated to the world of software and reverse engineering thereof. This site focuses primarily on talk and blogs all pertaining to RE. There are some seriously hi-brow threads to be found in addition to a number of fascinating forums and blogs. Be warned though, it is often far from easyb reading.

Anyway this covers some of the very basics of what is admittedly an absolutely massive topic (and that`s without even touching upon the *nix side of things).
If you have questions regarding this post or the topic in general please feel free to contact me either through the forum or on IRC and I`ll be more than happy to assist if I can. Just remember whilst I`m pleased to help, this does not extend to doing your job for you or running simple Google queries which you could do yourself. Fair warning ..

About IP

Before you can change your IP you need some information. This information includes your IP range, subnet mask, default gateway, dhcp server, and dns servers.


1. Getting your IP range - Getting information about your IP range is not difficult, I recommend using Neo Trace on your own IP. But for my test just look at your IP address, say it's 24.193.110.13 you can definitely use the IP's found between 24.193.110.1 < [new IP] < style="font-weight: bold;">Subnet Mask, Default Gateway, DHCP Server - These are very easy to find, just open a dos/command prompt window and type 'ipconfig /all' without the ' '. You should see something like this:
Windows IP Configuration:

Host Name . . . . . . . . . . . . . . : My Computer Name Here
Primary Dns Suffix . . . . . . . . . :
Node Type . . . . . . . . . . . . . . .: Unknown
IP Routing Enabled. . . . . . . . . : No
WINS Proxy Enabled. . . . . . . . : No

Ethernet adapter Local Area Connection:

Connection-specific DNS Suffix . . . . . . .: xxxx.xx.x
Description . . . . . . . . . . . . . . . . . . . . : NETGEAR FA310TX Fast Ethernet Adapter (NGRPCI)
Physical Address. . . . . . . . . . . . . . . . . : XX-XX-XX-XX-XX-XX
Dhcp Enabled. . . . . . . . . . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . . . . . . : Yes
IP Address. . . . . . . . . . . . . . . . . . . . . : 24.xxx.xxx.xx
Subnet Mask . . . . . . . . . . . . . . . . . . . .: 255.255.240.0
Default Gateway . . . . . . . . . . . . . . . . . : 24.xxx.xxx.x
DHCP Server . . . . . . . . . . . . . . . . . . . .: 24.xx.xxx.xx
DNS Servers . . . . . . . . . . . . . . . . . . . . : 24.xx.xxx.xxx
24.xx.xxx.xx
24.xx.xxx.xxx
Lease Obtained. . . . . . . . . . . . . . . . . . .:Monday, January 20, 2003 4:44:08 PM
Lease Expires . . . . . . . . . . . . . . . . . . . .:Tuesday, January 21, 2003 3:43:16 AM


This is all the information you will need for now, I suggest you either keep your dos/command prompt window open or copy & paste the information somewhere, to copy right click the window and select text and click once.



III. Changing your IP Address


To change your IP address first pick any IP you like out of your IP range and remember it or write it down. It is usualy a good idea to make sure the IP is dead (except for what we are going to do later on) so just ping it via "ping x.x.x.x" and if it times out then you can use it. Now go to My Computer, then Control Panel. In Control Panel select Network Connections and pick your active connection, probably Local Area Connection or your ISP name. Open that connection by double clicking on the icon in Network Connections, then select Properties under the General Tab. In the new window that pops up select Internet Protocol (TCP/IP) and click properties, it's under the general tab. In this new window select the General tab and choose "Use the following IP address" and for the IP address enter the IP you would like to use (the one you picked from your subnet earlier) and for the Subnet Mask enter the subnet mask you got when your ran ipconfig /all, same goes for the Default Gateway. Now select "Use the following DNS server addresses" and enter the information you got earlier. Now just click OK. Test that it worked, try to refresh a website and if it works you know everything is okay and you are connected. To make sure the change worked type ipconfig again and the IP address should have changed to your new one.



IV. DDoS & DoS Protection


If your firewall shows that you are being DDoSed, this is usually when you are constantly getting attempted UDP connections several times a second from either the same IP address or multiple IP addresses (DDoS), you can protect your self by changing your IP address via the method I described above.



V. Web servers & Other Services


If you know someone on your IP range is running a web server and he or she has pissed you off or you just like messing around you can "steal" their IP address so any DNS going to that IP will show your site instead because you would be running a web server yourself.

To "steal" an IP is to basically use the changing IP address method above and picking an IP that someone that is running a web server has in use. Often you will be able to keep that IP at least for some time, other times you wont be able to use it so just keep trying until it works. You your self will need to have a web server on the same port with your message. You can do this with other services too. You can also DoS or DDoS the IP address you are trying to steal to kick him off the net, but I don't recommend as its pretty illegal, an your ISP will get pissed

What is Subnetting?

Two network segments are restricted by distance limitations. Submetting or dividing the network into the segments is also required when localized network management is required for example accounting, sales, customer service departments. There is another reason for the subnetting, which is that the computers on the network, which use more bandwidth, needs to be separated from the rest of the computers. There are certain advantages and disadvantages of the subnetting. Before you start dividing your network into the different segments, you should assign the IP address to each computer in your network segment.

Subnetting makes the network management easier and it is also very helpful for the troubleshooting of a network segment. The internet is a collection of networks where users communication with each other. Each communication on the internet carries the source and the destination address of the computer. This address is called IP address. This 32 bit address has two parts: one part represents the network portion and the other part represents the host portion of the IP address. A company can use some of the bits in the machine or host portion of the address to identify a subnet. In this scenario, the IP address contains three parts: the network address, the subnet address and the machine address.

Subnet Mask Basics

The most recognizable part aspect of subnetting is the Subnet mask. A subnet mask contains 4 bytes, 32 bits and is divided into 4 period separated octets. Typically, a very common subnet mask in binary looks like this.

11111111 11111111 00000000 00000000
255 255 0 0

How to Apply a Subnet Mask

A subnet mask does not work like an IP address and it cannot exist separately without an IP address. An IP address and subnet mask work together to form a network. An IP address splits into two main parts when applying the subnet mask. The leftmost bits of a subnet mask must be set to 1. For example

11111111.00000000.00000000.00000000
11111111.11111111.00000000.00000000
11111111.11111111.11111111.00000000

The above example shows the valid representation of a subnet mask into the binary numbers.

00000000.00000000.00000000.00000000 is an invalid subnet mask.
11111111.11111111.11111111.11111111 is also invalid subnet mask.

All valid subnet masks contain two parts: the left side with all mask bits set to '1' (the extended network portion) and the right side with all bits set to '0' (the host portion), such as the first example above.

Subnetting an IP network can be performed for a variety of reasons such as using the different physical media in an organization, such as FDDI, WAN and Ethernet, preservation of the addresses and for the purpose of security, management and ease of troubleshooting. The most

common reason of the subnetting is to control the network traffic. In an Ethernet network, all computers in a segment see all the packets that are transmitted by all the other computers on the same segment.

In this situation, the network performance can be badly affected due to the heavy traffic loads, collisions and the retransmission of the packets. A router is used to connect the IP networks and it also helps to minimize the load of the traffic.

Subnet Masking

By applying the subnet mask to the IP address you can identify the network and host portion of the IP address. The decimal number 1 represents the network portion in the subnet mask and the node is represented the 0s. Performing a logical AND operation between the IP address and the subnet mask resulting in the network address.
For example, using our test IP address and the default Class B subnet mask, we get:
10001100.10110011.11110000.11001000 140.179.240.200 IP address of the class B
11111111.11111111.00000000.00000000 255.255.000.000 Default subnet mask of class B
--------------------------------------------------------
10001100.10110011.00000000.00000000 140.179.000.000 Network Address value

The following example shows the default subnet masks.
• Class A Subnet Mask- 255.0.0.0 - 11111111.00000000.00000000.00000000
• Class B Subnet Mask- 255.255.0.0 - 11111111.11111111.00000000.00000000
• Class C Subnet Mask- 255.255.255.0 - 11111111.11111111.11111111.00000000

Subnetting Review

Subnetting allows network and system administrators some flexibility in defining relationship among the hosts of a network. Hosts on the logically and physically different subnets can talk to each other through specialized devices called gateway or router. The ability to filter the traffic between

subnets can make the more bandwidth availability. Subnetting referred to as subdivision of a class based networks into subnetworks.

A router can exchange subnet routes with the other routers in the network. A subnetted network can’t be split into the isolated portion. All the subnets must be contiguous because the routing information cannot be passed to a non-network member. Router can exchange subnet routes with other routers within the network. Since the subnet masks are identical across the network, the routers will interpret these routes in the same manner. However, routers not attached to the subnetted network can't interpret these subnet routes, since they lack the subnet mask.

Therefore, subnet routes are not relayed to routers on other networks. This leads to our second

restriction. Subnetting allows you to create multiple logically different networks within the same class A, B or C. If you break a major network into smaller networks, it allows you to create a network of interconnecting subnetworks. Any device or gateway that is responsible for connecting the different subnetworks must have the distinct IP address one for each subnetwork.

To subnet a network use and extend the natural subnet mask using some of the bits from the host ID portion to create a subnetwork ID. In this example, given a Class C network of the IP address 4.15.5.0 which has a natural subnet mask of 255.255.255.0, you can create subnets in this manner:

11001100.00001111.00000101.00000000 204.15.5.0
11111111.11111111.11111111.11100000 255.255.255.224

---------------------------------|subnet|----

By extending the natural subnet mask to be 255.255.255.224, you have used three bits from the host portion of the mask and used them to make subnets. By using these 3 bits, it is possible to create 8 subnets. The remaining five ID bits of the host portion, each subnet can make 32 host addresses and the 30 addresses out of 32 are assigned to the devices or computers. The host IDs

of all zeros and all ones are not allowed.

204.15.5.0 255.255.255.224 host address range 1 to 30
204.15.5.32 255.255.255.224 host address range 33 to 62
204.15.5.64 255.255.255.224 host address range 65 to 94
204.15.5.96 255.255.255.224 host address range 97 to 126
204.15.5.128 255.255.255.224 host address range 129 to 158
204.15.5.160 255.255.255.224 host address range 161 to 190
204.15.5.192 255.255.255.224 host address range 193 to 222
204.15.5.224 255.255.255.224 host address range 225 to 254.

Ftp Error Codes What They Mean

FTP Error Messages
some nice info about ftp error codes so you know what they mean. i am sure you see them all the time and sometimes you dont know what they mean, so take a look here.

The most common codes:
421 - often means: too many users logged to the same account.

530 - wrong loginass, some servers auto-switch to 530 from
421 when they reach the max # of users. so notice the
error message attached to the code.

550 - common in Ratio site, If the file exsist it means you have no
access to the file or dir.
if you try changing dirs in an FTP and you`re getting a 550
message, it means you don`t have access to the dir, but,
It doesn`t mean you don`t have access to a dir
inside that dir. (meaning when getting a direct path, log into
the path directly, not 1 dir by 1).

All others:

110 Restart marker reply. In this case, the text is exact and not left to the particular implementation; it must read: MARK yyyy = mmmm Where yyyy is User-process data stream marker, and mmmm server's equivalent marker (note the spaces between markers and "=").
120 Service ready in nnn minutes.
125 Data connection already open; transfer starting.
150 File status okay; about to open data connection.
200 Command okay.
202 Command not implemented, superfluous at this site.
211 System status, or system help reply.
212 Directory status.
213 File status.
214 Help message. On how to use the server or the meaning of a particular non-standard command. This reply is useful only to the human user.
215 NAME system type. Where NAME is an official system name from the list in the Assigned Numbers document.
220 Service ready for new user.
221 Service closing control connection. Logged out if appropriate.
225 Data connection open; no transfer in progress.
226 Closing data connection. Requested file action successful (for example, file transfer or file abort).
227 Entering Passive Mode (h1,h2,h3,h4,p1,p2).
230 User logged in, proceed.
250 Requested file action okay, completed.
257 "PATHNAME" created.
331 User name okay, need password.
332 Need account for login.
350 Requested file action pending further information.
421 Too many users logged to the same account
425 Can't open data connection.
426 Connection closed; transfer aborted.
450 Requested file action not taken. File unavailable (e.g., file busy).
451 Requested action aborted: local error in processing.
452 Requested action not taken. Insufficient storage space in system.
500 Syntax error, command unrecognized. This may include errors such as command line too long.
501 Syntax error in parameters or arguments.
502 Command not implemented.
503 Bad sequence of commands.
504 Command not implemented for that parameter.
530 Not logged in.
532 Need account for storing files.
550 Requested action not taken. File unavailable (e.g., file not found, no access).
551 Requested action aborted: page type unknown.
552 Requested file action aborted. Exceeded storage allocation (for current directory or dataset).
553 Requested action not taken. File name not allowed.

IP AdressinG.....

Here you will learn about ip address network introduction and general overview of routing, subnet mask, subnetting, data communication. IP address is an identifier for a computer or device on a TCP/IP network and Internet. Networks that use the TCP/IP protocols route traffic based on the IP address of the destination computer or network device. The format of the IP address is 32 bits 4 octets 4 bytes such as 100.100.10.1, 210.100.22.30, 1.10.1.2 these are the examples of the IP address. The format is a 32-bit numeric value written as four numbers and separated by periods.

Each number in the IP address can be between 0 and 255. In your private network, you can assign unique IP address randomly. However, when you want to connect your private network to the Public network such as Internet then you must need a registered IP address to communicate on the internet and to avoid duplicate address. The four numbers in an IP address are used in different ways to identify a particular network. The general internet registries such as APNIC, RIP, NCC and LACNIC assigns internet or IP addresses from the following 3 classes.

1. Class A- IP address from 0-126. It supports 16 million hosts and 126 networks.
2. Class B- IP address from 128-191. It supports 65,000 hosts and 16,000 networks.
3. Class C-IP address from 192-223. It supports 254 hosts and 2 million networks.
The number of unassigned IP address is running out and a new classless scheme called CIDR is replacing the classes based system of the IP address. In this system the A, B and C class is tied to adoption of IPV6.


Every device connected to the Internet must need a unique identifier, which is called an IP address. An IP address is a numeric value separated by periods into four octets. These numbers are usually assigned to the ISPs (internet service providers) within region-based blocks. An IP address can be used to identify a region or a country. An internet user’s geographical location can be determined with the help of an IP address. The number system is generally difficult to remember so the IP address may also assign to a Host name.

The host names are usually easy to remember. In simple words, every website on the internet must bound or mapped with an IP address. At one time ISPs usually issue one IP address to each user. Within each ISP a DHCP (Dynamic host configuration protocol) server is configured, which dynamically assigns IP addresses from a given pool to each user who connects to the ISP. Dynamic IP addresses also limit the ability of a user to host websites, mail servers, ftp server, mail server and web portals.

Understanding IP Addresses Scheme

An IP address is an address that is used to uniquely identify a device or computer on an IP-based network. An IP address is an address used to uniquely identify a device on an IP network. An IP address can be divided into two parts network portion and a host portion. Each IP address is associated with a subnet mask. The 32 bit address is broken into 4 octets and 1 octet=8 bits. Each octet is converted to a decimal and is separated by periods.

For example 0000000000.11111111.00000000.11111111 this is a binary representation of an IP address. Each octet’s decimal value ranges between 0 and 255. The binary octets convert into decimal value. Here you can see that how a binary octet converts into decimal value. The right most bit or least significant bit of an octet will hold a value of 20.
The bit left to that bit will hold a value of 21. This process continues until the left most bit or the most significant bit holds the value of 27. If all the binary bits are one the decimal representation will be like this.

1 1 1 1 1 1 1 1
128 64 32 16 8 4 2 1 (128+64+32+16+8+4+2+1=255)

Now here is a sample conversion of the octet if not all the bits are set of 1.

0 0 1 0 0 0 0 1
0 0 32 0 0 0 0 1 (0+64+0+0+0+0+0+1=33)
In the following example you can see the IP address representation both in binary and decimal values.

64. 2. 135. 19 (decimal)64+2+135+19=220
01001010.00000010.1000111.00010011 (binary)

The octets are broken down to provide a large number of the addressing scheme that can accommodate small and very large networks. There are five different classes of the IP networks. Class A, B, C, D and E. The classes from A to C and mainly in use, D and E are experimental and reserved so they are not commonly in use. Due to the classless inter domain routing (CIDR) these addresses are not practically in use.

Network/Subnet Masks

A network mask helps you which portion of the address identifies the network portion and the host portion of an IP address. The three different classes of the IP addresses have their own default masks as shown below.
Class Subnet Mask

Class A: 255.0.0.0
Class B: 255.255.0.0
Class C: 255.255.255.0

An IP address on a class A network that has not been subnetted would have an address and subnet mask pair such as 10.111.20.1 255.0.0.0. If you want to know in more detail that how a mask help you identify the network and host part of the address simply convert the IP address and subnet mask into the binary numbers.

4.16.15.1= 00000100. 00010000.00001111.00000001
255.0.0.0 = 11111111. 00000000.00000000.00000000
If you have the address and the subnet mask in the binary forms then identifying the network portion and the host portion is very easy. Any address value that has the corresponding subnet mask binary value set to 1 show the network ID. Any address bit that has corresponding subnet mask value to 0 represents the host ID.

4.16.15.1= 00000100.00010000.00001111.00000001
255.0.0.0 = 11111111.00000000.00000000.00000000

Network id | host id
If you know your IP address of a computer, you can access the services such as online games, FTP, Web and Mail servers, and remote access utilities such as Remotely Anywhere, PCToGo, PCAnywhere, Remote control etc.

How do I change my IP address?

There are a number of methods by which you can change the IP address of your computer.

What is a Proxy Server?

A proxy server is a computer that offers network and internet access services to the client computers in a network. A client computer connects to the proxy server, requests a connection, services, files and other resources on the other servers. In some cases, the proxy may alter the client’s request and the server’s response for various reasons. By using the proxy server you can hide, conceal and make your network id anonymous by hiding your IP address. To get the anonymous status on the network or Internet, strong intermediate methods are employed like cryptography etc. Examples are remailers, P2P systems etc.

There is a large number of the software available that allows you to hide your IP address with the help of the proxy servers. The well known software for this purpose is Hide IP, Stealth surf, Netconceal, Anonymous surfing, Proxify and Ghost surf.

An IP address is a unique identification number for communication between computer networks, network devices such as computers, fax machines, printers and servers. It is like the number of an apartment or a phone number. IP addresses are of two types Static and Dynamic. Internet service providers’ use dynamic IP addresses and servers usually use static IP address.
The class A of the IP address constitutes almost 50% of all the IP addresses. This class is meant for large networks like the big multinational companies. Class B networks are medium sized like used in the colleges, Universities and other educational and training institutes. Class C IP addresses are usually used for the small companies.

The Regional Internet Registry (RIP) provides the IP addresses based on the geographical distribution. RIP also offers protection against the hackers that try to access the confidential data. All the personal information recorded by the ISP is kept in confidentiality.

About Proxies

What is a Proxy Server?
A proxy server is a kind of buffer between your computer and the Internet resources you are accessing. The data you request come to the proxy first, and only then it transmits the data to you. I know many are looking for IP Maskers or Scramblers, but honestly, it aint real easy for the simple fact that any website that you visit needs your IP to send the info packets too. If its scrambled, you will get alot of errors and crazy redirects :P My solution? Read on........... for a good list of Proxy servers try here>> Home of MultiProxy and Anonymous proxy list

Why do I need to use proxy servers?
Transfer speed improvement. Proxy servers accumulate and save files that are most often requested by thousands of Internet users in a special database, called “cache”. Therefore, proxy servers are able to increase the speed of your connection to the Internet. The cache of a proxy server may already contain information you need by the time of your request, making it possible for the proxy to deliver it immediately.
Security and privacy. Anonymous proxy servers that hide your IP address thereby saving you from vulnerabilities concerned with it.
Sometimes you may encounter problems while accessing to web server when server administrator restricted access from your IP or even from wide IP range (for example restricting access from certain countries or geographical regions). So you try to access those pages using an anonymous proxy server.

What is a public proxy server?
It is a proxy server which is free and open for everybody on the Internet. Unfortunately most of them are not anonymous.
Free service trying to provide list of public HTTP proxy servers. Usually provide small list of proxies with low percent of functioning servers due to hosting restrictions on CPU time (they simply can't allow themselves to check many proxies every second especially in parallel).

The Solution?
When using an anonymous proxy server you don’t give a anybody chance to find out your IP address to use it in their own interests. If there is a need to make an (inner) proxy connect to the outside world via another (outer) proxy server, you can use the same environment variables as are used to redirect clients to the proxy to make inner proxy use the outer one:
http_proxy
ftp_proxy
gopher_proxy
wais_proxy
E.g. your (inner) proxy server's startup script could look like this:
#!/bin/sh
http_proxy=http://outer.proxy.server:8082/
export http_proxy
/usr/etc/httpd -r /etc/inner-proxy.conf -p 8081

This is a little ugly, so there are also the following directives in the configuration file:
http_proxy http://outer.proxy.server/
ftp_proxy http://outer.proxy.server/
gopher_proxy http://outer.proxy.server/
wais_proxy http://outer.proxy.server/

Get your email@anything you want

https://accountservices.passport.net/reg.srf?xpwiz=true

How To Find Rapidshare Links With Google...

NOTE: Guide only for total Noobs

Ok for all those people who use sites such as phazeddl to find warez there is a much quicker and faster way; its called google.

Just type of the name (film/game/album/app) into google followed by the download site you want in this case rapidshare. I will use the game Call of Duty 2 as an example.

This is what you would type ing google: call of duty 2 + rapidshare.com


As you can see the websites with the highlighted links are the sites which will contain rapidshare links. This method can be repeated to search other download sites or even torrents.

Other possible search strings you could try, just look for hosts links:

call of duty 2 + megaupload.com
call of duty 2 + torrent
call of duty 2 + megashares.com



This image has been resized. Click this bar to view the full image. The original image is sized 773x795.

10 Tweaks that will make your Windows Vista fly

1. Speed Up Windows Vista Start Menu Search


As you execute a search you will be using the search box located in the start panel. Then Vista will start searching the file index without any prompting. Keep in mind that the file index will be very big due to the fact that it has all files included on your hard drive. If you are looking to speed up your searching methods then you can try this. Go to your Start Menu and narrow down the scope of the search. In other words try to narrow down what you are looking for. Instead of a general term use something more specific. There are two ways in which you can do this.

The first way is called the Registry hack and for that this is what you have to do.

1. Step one: Open up the registry editor using the word regedit.
2. Step Two: Guide to HKEY_CURRENT_USER > Software > Microsoft > Windows > CurrentVersion > Explorer and then choose the Advanced key.
3. Step Three: Locate and then right click on the Start_Search Files and then select the Modify key.
4. Step Four: You now have to change the Value to Zero.
5. Step Five: Then restart your Explorer.exe or you can simply just reboot the computer.

If this method does not work for you then you can try this:

1. Step One: Using your mouse right click on the Start button and then choose the Properties key.
2. Step Two: then click on the button that says Customize.
3. Step Three: Then see all of the checked items, uncheck the Search Communications.
4. Step Four: Then reset the search files to the setting Don’t Search for files.
5. Step Five: Click the Ok button.

2. Increase your SATA Disk Drive Performance


If you are looking to increase your SATA Disk Drive Performance you can definitely do so. What your first step is in doing so is setting up your write caching. But keep in mind as you do that there is a risk of data loss and corruption in the event of a power loss. This loss is only significant in a personal computer, the risk is a lot less in a lap top because, it runs on batteries.

To increase the SATA Disk Drive performance you can follow these simple steps:

1. Step One: Start by clicking on the Start Button and then enter the Device Manager and then hit the enter key.
2. Step Two: Expand the Disk Drives so they are not carrying too much information which will slow them down.
3. Step Three: Then right clock on the hard disk drive and then choose the Properties key.
4. Step Four: Then where it says Policies, you want to have checked off the Enabled Advanced Performance key.
5. Step Five: The click the Ok button and then close the device manager and you are all set.

3. Speed Up your Windows Vista Aero


The way Windows Vista is set up is really just for show. But because it is a new systems it can decrease the speed of your system. There are really only two ways to increase the speed of the Aero interface that is on your Vista system.

The first way is to Disable the Transparent Glass Effect:

1. Step One: Click on the Desktop icon on your screen and then choose Personalize.
2. Step Two: Choose the Windows Color and Appearance of your choice.
3. Step Three: Make sure you remove the check from the enable Transparency key.

The second way to speed up the Aero is to remove the Windows Minimum and Maximize the Animation key. You can do this by:

1. Step One: Start by clicking the Start Menu and then enter the System Properties Performance and then hit the enter key.
2. Step Two: When you see the Visual Effects section, remove the check mark from the Animate Windows When Minimizing and Maximizing.
3. Step three: Click Ok.

4. Windows Powered Smart Display
What is the Windows Powered Smart Display ?


What this is, is part of the Windows XP Professional Desktop. It is used in conjunction with the Remote Desktop Connection which is used through a wireless LAN link. This link is then used to get into your XP desktop from anywhere in the wireless range. So in other words, it is a remote wireless connection that your computer can use as along as the computer sits in the range of the wireless access.

Here are some other features that the Smart Display has:

The Smart Display has some great features, there is an on the screen keyboard which actually uses handwriting recognition software. It will allow you to use a USB mouse and keyboard if you are not used to the onscreen device yet . It can be used with a docking station and a mouse and keyboard. It is like using a small desktop computer from anywhere in the house or office. You have to keep in mind that the Smart Display itself does not have any file storage at all but the information that you use on the Smart Display will actually be stored on your desktop.

5. User Access Control

The User Access Control, this does not have to be used and can be turned off by simply clicking the Start button and then click the new Tools Menu and then scroll down and then when you see the access control key click it off. Then reboot your system.

6. Run as Administrator


You have to check because there is some software that you will not be able to install, even though you are logged in as an Admin. Simply right click in the mouse in the setup file and simply choose the Run as Administrator.

7. Added Wi-Fi Security


Added Wi-Fi Security, When you are looking for more security, go into the Network and Sharing menu and then click on Customize and choose the Public key . This will tighten up your Wi-Fi security when you are on public Wi-Fi.

8. Add Copy as Path


Simply hitting the shift key and then right click on a folder or you can choose any icon adds Copy as path and Open as command window here, you can edit them to the Windows Defender. Open up the Windows Defender and then click on the Tools key and then click on the Software Explorer and then take off the programs that you don’t want to run.

9. Keyboard short cut secret


Using a left to right format give the icons on your Quick Launch bar a number, this way you can launch the icons in order of preference.

10. Free Up More Space on your computer


In order to do this you can use the Windows Disk Cleanup . This will get rid of files that you don’t use, it will also get rid of memory and other operating system that contain files of unwanted material. By getting rid of the junk you can free up a lot of space for the important things you need...

Multiple Login in Yahoo messenger with out any Patch !!

!! Multiple login in yahoo !!

You can login with multiple ID's on the same yahoo messenger.

Follow these steps : ==>>

* Go to Start ==> Run ==>> Type regedit , hit Enter.

* Go to HKEY_CURRENT_USER ==>> Software ==>> Yahoo ==>> Pager ==>>Test

* On the right pane ==>> right-click and choose new Dword value .

* Rename it as Plural.

* Double click and assign a decimal value of 1.

* Now close registry and restart yahoo messenger.

* For signing in with new id open another messenger .

How to Hide Your Files In An Image..

Hide Your Files In An Image
All you need is WinRAR INSTALLED ON Windows XP.

Gather all your files

Now add those files in a RAR Archive
For example Secret.rar

Now copy the RaR file to a folder.
For Example : C:/hidden/

Now copy any image which is in JPEG format to the same folder above.
For Example logo.jpg

Now Open MS-DOS
Start > Run type "cmd" without quotes.


In Dos window something like this should be written
"Microsoft Windows XP [Version 5.1.2600]
(C) Copyright 1985-2001 Microsoft Corp.
C:\Documents and Settings\Administrator>
"

to change it to C:/Hidden/
type "cd\" without quotes.
then type "cd hidden" without quotes.

then type this
COPY /b logo.jpg + secret.rar output.jpg

Now you will see a output.jpg in that "C:\Hidden\" folder.
Now only winrar can open it.

Lock any folder without using any software. !

1. Suppose you have a folder named abcd in D:\abcd.

2. In the same drive next to the folder create a new notepad file with the exact statement
ren abcd abcd.{21EC2020-3AEA-1069-A2DD-08002B30309D}


3. Now save this text file as loc.bat

4. Create another notepad file and type
ren abcd.{21EC2020-3AEA-1069-A2DD-08002B30309D} abcd


5. Save this as key.bat

6. Now there are two batch files. Double click loc.bat and your folder will change into Control Panel and its contents cannot be viewed .

7. To open the folder double click key.bat and you get back your original folder.

8. For more safety keep the key.bat in another location .Only for unlocking copy paste to the original location and double click.

Hibernating in Vista

I’m sure many of you are aware of the hibernation option on Windows computers. I have always been a fan of that feature, because it allows you to save your open windows and settings while still shutting down your computer. Then when you boot up your computer again, the same windows will be open. I used the hibernation feature in Windows Vista a few times, but out of nowhere, it disappeared!



Luckily, I was able to figure out how to fix the problem and I’m going to share that with you today!

1.) Now, it's possible that if the hibernation option never showed up on your computer, your PC may not support it. However, if you know you had the option before and it's no longer there, you can follow the steps below to get it back.

2.) The hibernation option was most likely deleted because of a glitch in the Disk Cleanup wizard that causes it to delete the Hibernation File Cleaner.

3.) To get it back, go to Start and type in "command."

4.) When you see Command Prompt in the list, right click on it and select "Run as administrator."



5.) The command prompt will then open. All you need to enter is "powercfg/hibernate on" and then press Enter.



6.) Finally, just restart your computer and the hibernation option should be back.

How To Access System Volume Information Folders !!

The System Volume Information Folders contain your System Restore points. You can delete all or just the oldest ones manually if you like (but they must be sequential). These folders are hidden system folders on each drive. In order to gain access, follow the directions below depending on your version of XP and File System:


Windows XP Professional or Windows XP Home Edition Using the FAT32 File System


Click Start , and then click My Computer

On the Tools menu, click Folder Options

On the View tab, click Show hidden files and folders

Clear the Hide protected operating system files (Recommended) check box

Click Yes when you are prompted to confirm the change

Click OK

Double-click the System Volume Information folder in the root folder to open it


Windows XP Professional Using the NTFS File System on a Domain


Click Start , and then click My Computer

On the Tools menu, click Folder Options

On the View tab, click Show hidden files and folders

Clear the Hide protected operating system files (Recommended) check box

Click Yes when you are prompted to confirm the change

Click OK

Right-click the System Volume Information folder in the root folder, and then click Sharing and Security

Click the Security tab

Click Add , and then type the name of the user to whom you want to give access to the folder. Choose the account location if appropriate (either local or from the domain). Typically, this is the account with which you are logged on. Click OK , and then click OK

Double-click the System Volume Information folder in the root folder to open it


Windows XP Professional using the NTFS File System on a Workgroup



Click Start , and then click My Computer

On the Tools menu, click Folder Options

On the View tab, click Show hidden files and folders
Clear the Hide protected operating system files (Recommended) check box. Click Yes when you are prompted to confirm the change

Clear the Use simple file sharing (Recommended) check box

Click OK

Right-click the System Volume Information folder in the root folder, and then click Sharing and Security

Click the Security tab

Click Add , and then type the name of the user to whom you want to give access to the folder. Typically, this is the account with which you are logged on. Click OK , and then click OK

Double-click the System Volume Information folder in the root folder to open it


Windows XP Home Edition Using the NTFS File System


In Windows XP Home Edition with the NTFS file system, you must use the Cacls tool, which is a command-line tool to display or modify file or folder access control lists (ACLs)

Click Start , click Run , type cmd , and then click OK

Make sure that you are in the root folder of the partition for which you want to gain access to the System Volume Information folder. For example, to gain access the the C:\System Volume Information folder, make sure that you are in the root folder of drive C (at a "C:\" prompt). To get to the root of any partition, make sure you are in that partition and then type "cd\" (without the quotation marks).

Type the following line, and then press ENTER:

cacls " driveletter :\System Volume Information" /E /G username :F

Make sure to type the quotation marks as indicated. Also, if your user name contains a space you'll need to put your username in quotes. This command adds the specified user to the folder with Full Control permissions

Double-click the System Volume Information folder in the root folder to open it

If you need to remove the permissions after troubleshooting, type the following line at a command prompt:

cacls " driveletter :\System Volume Information" /E /R username

This command removes all permissions for the specified user.

Let Users Install Software Without Giving Them Administrator Rights

I recently discovered a new way to remotely install software. When users require a program to be installed on their computers, they download the software to their desktops. I then use Sysinternals’ PsExec utility (http://www.sysinternals.com/utilities/psexec.html) to remotely start the execution of the program, but I start the program interactively so that the user who is logged on to the target computer can complete the installation.

This approach is advantageous because you don’t need to give Administrator privileges to users who need to install software on their computers. When you run PsExec without a username and password, the remote process runs under the same account from which you execute PsExec (in this case, the Administrator account). Because the remote process is impersonating that account, the user won’t have access to network resources on the remote system. (When you specify a username and password, the remote process executes in the specified account and will have access to any network resources that the account has access to.) Using PsExec is handier than using the built-in RunAs command because you don’t need to be physically sitting at a user’s computer.

To use PsExec to remotely install software, you need to start the installer.exe program with the following command:

Psexec -i \\targetcomputer
\\targetcomputer\c$\
documents and settings\
username\desktop\installer.exe

The -i option starts installer.exe interactively for the user currently logged on to the machine specified by targetcomputer.

Installing Windows Media Player Bypassing Windows Genuine Validation

Hated youself that you downloaded WMP 11, but It said you couldn’t install it because You are on a pirated pc…

I also faced the problem… and I found a quick fix for it. Read on and see how to install it, bypassing WGA

Windows Media Player 11.0 is the latest Media Player by Microsoft. It offers great new ways to store and enjoy all your music, video and pictures along with its new cool look. You must have Windows XP Service Pack-2 (SP2) in order to install Windows Media Player 11.0. But still you will face a problem while installing this new Windows Media Player if your copy of Windows XP is not a genuine (non-pirated) one, since WMP 11.0 installation requires genuine windows validation.



But there are some tricky steps through which you can install WMP 11.0 even in your pirated copy of windows XP bypassing the genuine windows validation. You just have to follow the following steps one by one:

{1} Download Windows Media Player 11.0 (make sure its the final and latest version, not beta) from the Microsoft Site. Alternatively, you can download the installer file directly from here. Remember you can’t install Windows Media Player 11.0 if service pack 2.0 is not installed in your operating system.

{2} Extract the downloaded Windows Media Player setup file (wmp11-windowsxp-x86-enu.exe) using WinRAR to a directory (wmp11-windowsxp-x86-enu). Now make sure you have a “LegitLibM.dll” file in the extracted “wmp11-windowsxp-x86-enu” folder.

{3} Download the patched LegitLibM.dll and then copy-paste it to the “wmp11-windowsxp-x86-enu” folder and click yes when asked to overwrite.

{4} Now run “setup_wm.exe” file in the “wmp11-windowsxp-x86-enu” folder.



{5} Restart your PC, then run your Windows Media Player and you are done!!!

How to Change QuickTime MOV and MPEG-4

I got a question where someone asked me how to do a QuickTime MOV to MP4 conversion using QuickTime Pro 7. The answer to this depends on what MP4 file you want.

Someone may ask, “why it’s counting on the MP4 file I want? If you are a real Apple aficionado, you must not be unacquainted with QuickTime’s export function!”

Uh-huh, it’s easily to open up QuickTime “Export” option from the “file” menu and easily to select converting “Movies to MPEG-4”, and click “Save”. And even, you can just directly modify the file extension from .mov into .mp4 to do the conversion. Yes, these are somewhat MOV to MP4 change. But is it enough?

For some QuickTime newbies who are new to the process of MOV to MP4 creation, things can be quite confusing. In some cases, they did the conversion just as above, but found the output MP4 files cannot be played on the PSP or other MP4 players.

Let’s go back to the scene before “Save” click. Press the “Options” button right-hand “Export” box to pop out the “MPEG-4 Export Settings” dialog. Under the dialog, you’ll find there are 2 choices for “File Format” selection: MP4 ISMA and MP4.

ISMA (Internet Streaming Media Alliance) is an early alliance with representatives from all points of the streaming work-flow. Therefore the MP4 ISMA is especially better for streaming media over Internet and cellular phones with a low resolution. So if you are trying to get an MP4 movie in common or in HD, take the “MP4” file format.

Likewise, there are more than one options out there for “Video Format”. “None” means you can just get music or audio off the original movie without any image frames. “MPEG-4 Basic” defined the normal MP4 videos in some kind of low compression ratio. “MPEG-4 Improved” offers you HD MP4 video output using MPEG-4 codec, while “H.264” also gives you the high definition video quality with H.264 (MPEG-4 AVC either) codec. “Pass Through” is interesting. It just changes the MOV video container to be the MP4 video container without any interchanges, and this, is what I mentioned above, the “extension modification”.

So that’s it. All the left is just to keep the default parameters or do some changes, and then, click “Save”.

OK, if there are still confusions about conversion from MOV to MP4, and MOV to HD MP4, please go to [URL="http://www.mov-converter.com/"][U]MOV converter[/U][/URL] and see this guide: [URL="http://www.mov-converter.com/articles/how-to-convert-mov-to-mp4-with-quicktime-pro-7.html"][U]How to convert MOV to MP4 and MOV to HD MP4 with QuickTime Pro 7?[/U][/URL] And you can also check here for more [URL="http://www.video-x-ware.com/"][U]video converter reviews[/U][/URL]

How to Restart your friend’s phone using sms

Here is a new trick to restart ur friends mobile via sms

with this trick only 1110,1110i,1112,1100,2100 can be restarted.
just type

,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,

,,
,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,
,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,

or 79 inverted commas

in text msg and send it to ur friend having cells mention above and see wat happens.


Enjoy Mates !!

Remove Or Delete RecycleBin

---Start---run---regedit---

------------------------------------Registry key-------------------------------------------

HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\Windows\Curr entVersion\Explorer\bitbucketModify/create the value data Type(s) and value Name(s) as detailed below.

Data Type: DWORD // Value Name: NukeOnDelete
setting for value Data: [0 = Use Recycle Bin / 1 = Permanently Delete]

exit registry and Reboot

--------------------------------------------- ANOTHER MUCH FASTER WAY----------------------------------------------------

Start->run->gpedit.msc->user configuration->desktop->remove recycle bin from desktop->double click->"change is not configure to enable"->apply and ok

now come to start->run->gpupdate.exe and press enter

your recycle been will be removed from your desktop you will have to revert the settings if you want it back

AFTER YOU REVERT SETTINGS MAKE SURE TO RUN gpupdate.exe COMMAND

REMEMBER TO THANKS IF YOU LIKE THE THREAD

How to make invisible folders via DOS

Friends Hide your folders with out using any soft
just go to

-->run

-->cmd

-->note 1 "_" give 1 space on that place

-->note 2 if your folder is at D: drive then

-->first you D: and press enter after you write below command

-->Attrib "your folder name"_+r_+a_+s_+h

-->Press Enter

-->if you want to view that folder then you write same command use with like

-->attrib "your folder name"_–r_–a_–s_–h