Banjara lambani

Monday, 6 February 2017

Digital ads and advertising SEO to make money fast in united state of America(USA)

Digital ads and advertising SEO to make money fast

until january 1st to use these services
you call the local acssess number and
then type in a 5 or 6 digit code.you
can get programs that will call mci
,sprint,or whatever and try consecutive
numbers until it gets one.to fight
against this the companys use 2 things.
..

1.they have dummy numbers that you thin
k work but when you call using it
they trace you!

2.they change the numbers randomly
eveery week or less,so you cant use
a number to long!

here are some access numbers you can
try hacking...

access numbers
--------------

metrophone-(415) 579-6001
itt-(415) 858-2750
mci-(415) 495-2640
sprint-(415) 348-7700

future developments
-------------------

after january first,the date the att
break up starts,all hell will break
loose because the reginal companies
will not no what the fuck to do!
who will profit from this?

Saturday, 4 February 2017

Brand new launched apple iPhone gadgets

Brand new launched apple iPhone gadgets

Sometimes if the no one is home at the number you're trying to bill to, you 
can convince the operator that it's really you're number if you know what the
answering machine message is going to say and if you can do an impression of
their voice on the machine. Even a bad impression will sometimes work.

When doing this from home, try not to use the same number more than two or
three times so the owner of the number will be less likely to investigate.

I've experienced third-party billing from both sides. Someone charged forty
dollars worth of calls to my dad's phone and the operators were very 
unhelpful and unfriendly. They refused to investigate even though it was
comming from a residential line and it took two months to get the charges
removed. This was back in 1990 but I've been doing this for a few years now
and people don't seem to care too much at a few calls totaling to under ten 
bucks. I've actually called the people I used and asked them about it and they 
almost always blow it off as a "minor nusience."

AT&T is completely automated from your home and the best to use. U.S.Sprint
is the second best because they're not automated but they also don't call and
verify. M.C.I. sucks because they're losers who verify no matter what so don't 
use them. To choose your company, before you dial the number dial 10288 for 
AT&T or 10333 for U.S. Sprint.

International calls will be verified no matter what from pay phone or home.
Hope this file benefits everyone who reads it. It'll sure cut your long
distance bill down a lot.

May 13, 1995 Update:
-------------------
Well, it seems that AT&T are finally waking up to this problem of third party
billing...On my local phone bill I was backbilled for $175 worth of third 
party calls. The kicker part is that I called the phone company and complained
that there were all these extra charges on my bill that I know nothing about
and they were more than happy to take the charges off. A few weeks later, I
got a letter from AT&T concerning some more charges...

eHealthcare solutions and insurance quote

eHealthcare solutions and insurance quote

First of all, if you're going to be calling from home, it's best to charge
the calls to a different area code than your own. Sure, a local number will
work but when the people get their phone bill and see a local number on it,
they'll most likely call it to find out what it is. When they see a long
distance number they think "Goodness gracious! If I call that number my
phone bill will even be higher." Even if they do call you, you can just play
ignorant and if they're far away they probably won't come looking for you.

Pick a city, any city. The city should be far away in another state. Now dial
local information and ask for the area code to your city. Let's say you
picked Waverly, Iowa. The area code is 319. Now dial 1-319-555-1212 to call
Waverly Directory Assisstance. The charge for this call should only be about
sixty cents.

Now think of a very common last name like Smith, Lawrence, Conner, Mitchell,
Shlappenheimerwinthrop, etc. You get the idea. 

OPER: Directory Assisstance, Betty. What city, please?
 YOU: Waverly.
OPER: Go ahead.
 YOU: I need the number of a last name Conner.
OPER: (type, type, type) Okay I have two Conners listed. A Bob and an
      initial H.
 YOU: Bob, yeah that's it. Definately Bob. Bob it is. Gimmie Bob. Yeah, Bob.
OPER: The number is 452-0357.

So that's the number you'll bill to. 319-452-0357. Of course if you're 
planning to do this extensively you'll need many more numbers to pick from.
That's when you call up the phone company and ask for a phone book to be
delivered to you so you'll have a whole list of numbers to choose from. A
normal book will cost about $7.00 or so. If you know how to do it right, it
won't cost you anything but I won't get into that. The phone book will pay
for itself after about 3 or 4 long distance calls.

Advertising alliance and new upcoming android mobile apps

Advertising alliance and new upcoming android mobile apps

Breaker B0X

   This is a new b0x INVENTED AND MADE BY _--=PeEll=--_ on June 18, 1995 at 
11:20 pm central time.  Okay?  This is not really a box.  This has nothing 
to do with tha fone system.  It has to do with a person's (not yours) breaker
box and electrical system within his/her house.  This is foe info only.  
These plans should not be use in an illegal way.  There are two wayz to make 
this box.

   Materials

2 Extension cords (doesn't matter how long)
Knowledge of splicing wire
Whatever you need to splice
A plastic crate
A long thin (but strong) peice of wood (a stick, broom-handle)

   How to make it

   Take tha extension cords and cut off tha ends that you plug into tha wall 
(ya know tha plugs).  Make SuRe you have about four-five inchs on both.  Now
splice tha two plugs together.  *****If they have tha third prong you have to 
break it off*****  You should have something like this:

=|)-------(|=

   Now to use it

   Go to tha enimies house and find an outside power outlet.  Plug one of tha
plugs into one of tha outlets.  THEN GET ON THA CRATE!!!  Make SuRe that no 
part of you is touching tha ground.  Then plug tha other end in (cause there 
is usally two sockets).  Watch tha sparcks.  It may start a fire.  When it 
stops lighting up tha ski, take tha stick or whatever put it in tha loop and 
pull it out.  Grab it and run.

   Materials (foe tha second kind)

1 Extention cord
1 Bucket of Salt water (like a 5 gallon bucket filled with a lot of salt)

   Cut tha cord so you have about six-seven feet of cord.  Now find an 
outside power outlet and plug in tha cord (might wanna get a crate).  Now you
have a LIVE wire.  THROW (so you are not holding it) into tha bucket of 
water.  You may have to leave tha breaker box there.

   This b0x is KewL cause if it doesn't trip tha breakers or fuses it will 
fry tha wires in tha house!!!  If something is running and using electricity 
it may blow it (ie lights, TV, things like that).

About webads and search engine marketing

About webads and search engine marketing


Here we'll go over in detail some of the most common operators.

 TSPS OPERATOR:

Trafic (us) Service Position System Operator is the bitch you commonly here
whenever you use a pay phone etc. To say the least she's a meat head. Her
responsibilities are as follows:

 [1] Getting all billing information for Calling Cards and 3rd number calls.

 [2] Making sure you get the right person on person-to-person calls.

 [3] Making sure the fool on the other end will pay for your collect call (why
     call collect?)

 [4] Identifying calling numbers, or basically asking you,
     'what number are you calling, please.' when the system fucks up.

Even though these operators are commonly ding-bats, you shouldn't screw with
them, for they are known to be quick with the tracer. She can even tell if you
are calling from a fortress phone. She has a portable all time ready tracer.
Beware of these deadly bitches.

  INWARD OPERATORS:

This wench is basically an apprentice to the bitch above (TSPS) or commonly
the '0' operator. She will never question you as long as you are within her
dimension (service) area. She can only be reached by a mighty Blue Box
(discussed in up and coming tutorial) or another operator.

  DIRECTORY ASSISTANCE OPERATORS:
     (DOA?DAO?)

This is the operator you get when you call directory assistance (555-1212).
All she can do is either tell you a listed number or tell you if a number is
unlisted. Waste of time.

  DEAF D.A.O.'S

This neat little operator is set up to help with directory assistance for deaf
people (who would they want to talk to?). She's reachable by dialing
800-855-1155. She talks to the deaf via Teletypewriters (terminals). If your
modem can transfer baudot (Oh those sweet Apple Cats can) then you can talk to
her. You might find her alot more friendly, more talkitive, and alot easier to
manipulate a number out of. However, she does use abbreviations like GA for go
ahead (pretty tricky huh).

About Facebook and Instagram

About Facebook and Instagram

Telex II, as you can see above there are 5 TWX machines. They are all owned by
Western Union. Normally these babes may only be accessed by other TWX
machines, however, if you do not wish to go and purchase one you can access
them by use of the Easylink, by Western Union. For more on this I would
suggest reading The Bioc Agents, and Tucs article on 'Hacking Western Union's
Easylink.'

   700:

This is a new service for employees of AT&T in which someone (one of the
special employees) can call his own 700 number (say 700-292-9876), enters
his/her code, and where he is staying and then hangs up. If there is any new
info on the case he is working on, the computer will call him back and tell
him all the latest updates.

   800:

There are basically two types of Watts Lines, Inward Watts and Outward watts.
These are probably some of the nicest of the special area codes since they
allow you to call for free. Here's an explanation of the two:

 INWARD WATTS:

Inward Wide Area Telecommunications Service is probably the one your most
familiar with. MA has developed it so there are 6 different levels of Inwatts.
Level 6 being the whole U.S. (all 50 states) level 5 being all 48 contienental
states etc. all the way down to 1, only one state. Usually a company will get
a level 6 and then a level 1 because all though level 6 allows you to call
from anywhere in the U.S. it excludes the state where the call is terminated
at, so the company usually buys a level 1 for that state.

Interstate Inwatts are less common but still exist. These are the ones you can
only call from say one state. You can tell one quite easily for they all have
a 2 for the last central office number, or the 6th number (ie. 800-XY2-XXXX).

About LinkedIn and Twitter

About LinkedIn and Twitter

Well, examine a phonecard - preferably a used one if you are going to 
scratch it or dissect it. If you look on the printed surface (the green 
side - which is the front) you will find two lines which form a thick band. 
Underneath this area is a "track" which holds the information about the 
number of units used up and how many are left. A used phonecard will have 
some tiny bars marked on the track near one end.

On the reverse side of the phonecard (the black side) you can see a shiny 
black strip in contrast to the matt black which has text on it (on older 
phone cards the whole of this side is shiny black). Anyway, this shiny strip 
is "opposite" the band on the front and acts as a "window" to the information 
on the track - for the simple reason that it is no ordinary shiny black 
plastic. This special black plastic is not like all the others (which do 
not let normal light or infra-red light pass through) but is transparent to 
infra-red light. When a phonecard is in the machine, an infra-red beam is 
shone through the back of the card and the reflected beam is checked to 
detect the time units remaining.

Now to explain the track itself which is protected by a layer of paint that 
also serves as the base for printing text and figures visible to the user. 
On a 20-unit card, the track has 20 tiny rectangular areas (called 
diffraction gratings - you might have come across them if you took physics) 
which affect the light reflected by the cards. As the time units are used up, 
the ares are destroyed by an eraser head. The design of the assembly enables 
the progress of the erasing operation to be checked. in fact, the 20 
rectangular areas touch each other and form a continuous strip on the card.

The area which is read is wider than the track. This makes it possible to 
detect a reduction in track width.

Each unit is separated from its neighbour by a distance of 0.6mm. the erase 
area is greater than the width of the track so that the unit is always 
completely erased. The dimensions of both the card and the time units 
suggest 140 as the theoretical maximum number of units possible.

The read-and-erase mechanism consists of a moving carriage on which are 
fixed the eraser head and the optical components for reading. the carriage 
is driven by a stepping device which moves along the track to determine 
whether each unit is god or erased. when a unit has been consumed by the 
cardphone, the area is erased in its turn and the carriage moves on one step.

OK, for those that weant to know, here is an ascii graphical representation 
of the read and erase geometry : 

Friday, 3 February 2017

Newly launched latest cars and bikes

Newly launched latest cars and bikes

incoming from a step-by-step office. Trunks from such offices are often

referred to as "bylink" trunks even when incoming to noncrossbar offices; they

are more properly referred to as "dc incoming trunks." Such high-speed means

are necessary to assure that the first incoming pulse is not lost.



Cable Vault: The point which phone cable enters the Central Office building.



CAMA: Centralized Automatic Message Accounting - Pronounced like Alabama.



CCIS: Common Channel Interoffice Signaling - Signaling information for trunk

connections over a separate, nonspeech data link rather that over the trunks

themselves.



CCITT: International Telegraph and Telephone Consultative Committee- An

International committee that formulates plans and sets standards for

intercountry communication means.



CDO: Community Dial Office - A small usually rural office typically served by

step-by-step equipment.



CO: Central Office - Comprises a switching network and its control and support

equipment. Occasionally improperly used to mean "office code."



Centrex: A service comparable in features to PBX service but implemented with

some (Centrex CU) or all (Centrex CO) of the control in the central office. In

the later case, each station's loop connects to the central office.



Customer Loop: The wire pair connecting a customer's station to the central

office.

Cheap domain registration hosting

Cheap domain registration hosting

ACD: Automatic Call Distributor - A system that automatically distributes calls

to operator pools (providing services such as intercept and directory

assistance), to airline ticket agents, etc.



Administration: The tasks of record-keeping, monitoring, rearranging,

prediction need for growth, etc.



AIS: Automatic Intercept System - A system employing an audio-response unit

under control of a processor to automatically provide pertinent info to callers

routed to intercept.



Alert: To indicate the existence of an incoming call, (ringing).



ANI: Automatic Number Identification - Often pronounced "Annie," a facility for

automatically identify the number of the calling party for charging purposes.



Appearance: A connection upon a network terminal, as in "the line has two

network appearances."



Attend: The operation of monitoring a line or an incoming trunk for off-hook or

seizure, respectively.



Audible: The subdued "image" of ringing transmitted to the calling party during

ringing; not derived from the actual ringing signal in later systems.



Backbone Route: The route made up of final-group trunks between end offices in

different regional center areas.

Online shopping with cheap cost

Mesothelioma law firm 


 IN THE TELEPHONE SYSTEM, THE TWO-YWA COMMUNICATION IS CARRIED BY EITHER A
TWO-WIRE OR A FOUR-WIRE SYSTEM. IN THE FOUR-WIRE SYSTEM ON PAIR OF WIRES IS
CONNECTED FROM THE TRANSMITTER AT TELEPHONE A TO THE RECEIVER AT TELEPHONE B,
AND THE OTHER PAIR OF WIRES IS CNNECTED FORM THE TRANSMITTER AT TELEPHONE B TO
THE RECEIVER AT TELEPHONE A. IN THE TWO-WIRERE SYSTEM, WHICH USES ONE-HALF OF
THE WIRING OF THE FOUR-WIRE SYSTEM AND THEREFORE IS LESS COSTLY, BOTH
TRANSMITTER AND RECEIVERS AT TELEPHONES A AND B SHARE THE SAME PAIR OF WIRES FOR
THE TWO-WAY COMMUNICATION. THE POWER FOR THE COMMUNICATION IS PROVIDED BY A
BATTERY (OR AN APPROPRIATE POWER SOURCE WITH BATTERY BACKUP). THE BATTERY IS
USUALLY PROVIDED AT THE CENTRAL OFFICE IN COMMERCIAL TELEPHONE NETWORKS, THOUGH
IT CAN BE PROVIDED AT THE TRANSMITTER IN A PRIVATE OR SPECIAL PURPOSE FOUR-WIRE
SYSTEM.

     THE TRANSMISSION LINKS IN MODERN TELEPHONE SYSTEMS MAY TAKE SEVERAL
DIFFERENT FORMS, SUCH AS OVERHEAD WIRE, BURIED CABLE, MICROWAVE LINKS, SATELLITE
LINKS, AND SO ON. WHICH OPTION IS USED FOR A GIVEN COMMUNICATION DEPENDS
LAREGELY ON WHERE A AND B ARE LOCATED. IF A AND B ARE LOCATED CLOSE TO EACH
OTHER, THE INFORMATION WILL BE CARRIED OVER WIRES ON TELEPHONE POLES OR IN
OVERHEAD OR UNDERGROUND CABLES. IF A AND B ARE LOCATED ON THE SAME LAND MASS BUT
A LARGE DISTANCE APART, THE INFORMATION COULD BE TRANSMITTED OVER TELEPHONE
LINES, CABLES, MICROWAVE LINKS, OR EVEN SATELLITE LINKS). IF A AND B ARE
SEPARATED BY AN OCEAN, THE TRANSMISSION MUST BE THROUGH TRANSOCEANIC CABLE,
RADIO, OR SATELLITE LINKS, SINCE THESE ARE THE ONLY FEASIBLE WAYS TO GET
INFORMATION FROM ONE CONTINENT TO ANOTHER. WHICHEVER APPROACH IS USED, A MEANS
MUST BE PROVIDED FOR SELECTING THE PROPER PATHS OVER WHICH THE INFORMATION IS TO
TRAVEL. THIS REQUIRES SOME WAY TO CONNECT CIRCUITS THROUGH SWITCHES CALLED
NETWORK SWITCHING.

FURTHERMORE, THE NETWORK ALSO PROVIDES DETECTION CIRCUITS FOR ALL OF THE
SIGNALLING WHICH DETERMINES THE CALLING AND CALLED TELEPHONES AND ALL OF THE
LINE CHECKING REQUIRED TO ESTABLISH THA THE LINES AND TELEPHONES ARE CLEAR TO
COMPLETE THE COMMUNICATION. THESE SIGNALLING REQUIREMENTS DEPEND ON THE
CHARACTERISTICS OF EACH TELEPHONE SET AND ON THE SIGNALLING SEQUENCE REQUIRED TO
MAKE A TELEPHONE CALL.

Donate car for tax credit

Donate car for tax credit 

            There Are 3 Possible        We try to make sure
            Reasons Why:                that all of the files
                                        are correctly linked on
               * Hack-Net.Com is still  the archives, but
                 debugging the site,    sometimes we do make an
                 and it has been        error. If you are
                 removed from the       clicking on a file and
                 archive's to be        this same page is
                 re-indexed!, if this   appearing for more than
                 is the case then       3 days, then please
                 please wait a few days Email Us and tell us
                 until it is put back   which file is not
                 up!                    working and it will be
               * The File Never         corrected. Without your
                 Existed, (meaning that feedback we cannot help
                 Hack-net.Com have made you in your quest for
                 a small error in the   knowledge!
                 file name entry)
                 please Email Us if the Shann�rz and the
                 file is still not      

Life insurance co Lincoln

Life insurance co Lincoln

      Ok this is nothing big, it's my third text file for 1988 from cDc
  communications.  Here goes.

                                Time Zones
                                ----------

 Atlantic
 --------

 Newfoundland  Nova Scotia  New Brunswick

 Eastern
 -------

 Maine  New Hampshire  Vermont  Massachussets  New York  Rhode Island 
 Connecticut  Pennsylvania  New Jersey  Delaware  Maryland  Ohio  Indiana
 Michigan  West Virginia  Virginia  Kentucky  North Carolina  Tennessee
 South Carolina  Georgia  Florida  Quebec  Ontario

 Central
 -------

 Manitoba  North Dakota  South Dakota  Minnesota  Wisconsin  Michigan  Iowa
 Nebraska  Illinois  Kansas  Missouri  Kentucky  Tennessee  Arkansas  Oklahoma
 Texas  Louisiana  Alabama  Mississippi  Indiana

 Mountain
 --------

 Alberta  Saskatchewan  Montana  Idaho  Wyoming  South Dakota  Nebraska
 Utah  Colorado  Kansas  Oklahoma  Arizona  New Mexico  

 Pacific
 -------

 British Columbia  Washington  Montana  Oregon  Nevada  California  Utah


                            Area Code Listing
                            -----------------

   205 - Alabama              907 - Alaska                602 - Arizona
   501 - Arkansas             714 - California (Orange)   818 - California
   213 - California (LA)      916 - California            619 - California
   415 - California (SF)      408 - California (San Jose) 303 - Colorado
   203 - Connecticut          302 - Delaware              904 - Florida
   305 - Florida (Miami)      404 - Georgia (Atlanta)     808 - Hawaii 
   208 - Idaho                312 - Illinois (Chicago)    317 - Indiana
   219 - Indiana (Souend)     515 - Iowa (Des Moines)     316 - Kansas
   502 - Kentucky             504 - Lousiana (N. Orleans) 207 - Maine
   301 - Maryland             617 - Massachusetts         313 - Michigan 
   616 - Michigan             612 - Minnesota             601 - Mississippi
   816 - Missouri (Kansas C)  314 - Kansas (St. Louis)    406 - Montana
   402 - Nebraska             702 - Nevada                603 - New Hampshire
   201 - New Jersey (Newark)  609 - New Jersey (I'm here) 505 - New Mexico
   718 - NYC (Brooklyn, S.I.) 212 - NYC (Bronx, Mhattan)  518 - NY (Albany)
   716 - NY (Buffalo)         516 - NY (Long Island)      315 - NY (Syracuse)
   914 - NY (White Plains)    704 - North Carolina        919 - North Carolina
   701 - North Dakota         513 - Ohio (Cincinnati)     216 - Ohio
   614 - Ohio (Columbus)      419 - Ohio (Toledo)         405 - Oklahoma
   918 - Oklahoma (Tulsa)     503 - Oregon                215 - Philadelphia PA
   401 - Rhode Island (cough) 803 - South Carolina        605 - South Dakota
   901 - Tennessee (Memphis)  615 - Tennessee (Nashville) 806 - Texas(Cow Hell)
   214 - Texas (Dallas)       817 - Texas (Forth Worth)   713 - Texas (Houston)
   512 - Texas (San Antonio)  801 - Utah                  802 - Vermont
   703 - Virginia (Arlington) 804 - Virginia (Richmond)   202 - Washington DC
   206 - Washington (Seattle) 304 - West Virginia         608 - Wisconsin
   307 - Wyoming              666 - Where do you think

        Well that will make a nice printout for your wall, won't it.  Now
    you know where you're calling...

Annuity settlement


 Annuity settlement

b4 i get started, just remember i did not rite this phile 
so you people can learn preform telecommunications fraud!
contrary to popular beleafs phreaking is still an art form.
phreaking is a form of intelectual advancement. is just like
hacking, if u think of it this way: when hacking you type
certain commands in phreaking, you play certain MHz tones.
blue boxing is just like gaining r00t access of a unix sys.
by gaining r00t access you be come the 'system operator'.
the blue box utelizes 'system operator' tones. see what i'm sayn? 
just cuz phreaking is intelectual it dousnt mean it cant be fun. 

_`'-.,_,.-'`_`'-.,_,.-> [ definitions ] <-.,_,.-'`_`'-.,_,.-'`_

Phreak    ["free"k]  Verb--1. The act of "Phreaking"  
2. The act of making telephone calls without paying money 
[the word phreak is a combination of phone, freak, and free]

Phreaker ["free"-k-er]  Noun--1. One who engages in the act of 
"Phreaking" 2.One who makes telephone calls without paying 
money 

_`'-.,_,.-'`_`'-.,_,.-> [fone systems in the world today] <-.,_,.-'`_`'-.,_,.-'`_

               [1] Step by Step
               [2] Crossbar
               [3] ESS Electronic Switching System
 
 
                         Step by Step
                         ~~~~~~~~~~
 
First switching system used in America, adopted in 1918 and until 
1978 Bell had over 53% of all exchanges using Step by Step [SxS].  
A long,and confusing train of switches is used for SxS switching.
 
                         [> Disadvantages <]

 [A] The switch train may become jammed : Blocking call.
 [B] No DTMF [Dual-Tone Multi-Frequency]["Touch-tone"].
 [C] Much maintanance and much electricity.[0;36;40m
 [D] Everything is hardwired
 
                        +> Identification<+

 [A] No pulsing digits after dialing or DTMF.
 [B] Phone Company sounds like many typewriters.
 [C] No:  Speed calling, Call forwarding, and other services.
 [D] Pay-phone wants money first before dial-tone.

Wednesday, 1 February 2017

What to do if caught A Virus?

What to do if caught A Virus?


If you've let your guard down--or even if you haven't--it can be hard to tell if your PC is infected. Here's what to do if you suspect the worst.


Heard this one before? You must run antivirus software and keep it up to date or else your PC will get infected, you'll lose all your data, and you'll incur the wrath of every e-mail buddy you unknowingly infect because of your carelessness.

You know they're right. Yet for one reason or another, you're not running antivirus software, or you are but it's not up to date. Maybe you turned off your virus scanner because it conflicted with another program. Maybe you got tired of upgrading after you bought Norton Antivirus 2001, 2002, and 2003. Or maybe your annual subscription of virus definitions recently expired, and you've put off renewing.

It happens. It's nothing to be ashamed of. But chances are, either you're infected right now, as we speak, or you will be very soon.

For a few days in late January, the Netsky.p worm was infecting about 2,500 PCs a day. Meanwhile the MySQL bot infected approximately 100 systems a minute (albeit not necessarily desktop PCs). As David Perry, global director of education for security software provider Trend Micro, puts it, "an unprotected [Windows] computer will become owned by a bot within 14 minutes."

Today's viruses, worms, and so-called bots--which turn your PC into a zombie that does the hacker's bidding (such as mass-mailing spam)--aren't going to announce their presence. Real viruses aren't like the ones in Hollywood movies that melt down whole networks in seconds and destroy alien spacecraft. They operate in the background, quietly altering data, stealing private operations, or using your PC for their own illegal ends. This makes them hard to spot if you're not well protected.

Is Your PC "Owned?"

I should start by saying that not every system oddity is due to a virus, worm, or bot. Is your system slowing down? Is your hard drive filling up rapidly? Are programs crashing without warning? These symptoms are more likely caused by Windows, or badly written legitimate programs, rather than malware. After all, people who write malware want to hide their program's presence. People who write commercial software put icons all over your desktop. Who's going to work harder to go unnoticed?

Other indicators that may, in fact, indicate that there's nothing that you need to worry about, include:

* An automated e-mail telling you that you're sending out infected mail. E-mail viruses and worms typically come from faked addresses.
* A frantic note from a friend saying they've been infected, and therefore so have you. This is likely a hoax. It's especially suspicious if the note tells you the virus can't be detected but you can get rid of it by deleting one simple file. Don't be fooled--and don't delete that file.

Cant See Secure Sites

Cant See Secure Sites


Fix the problem with seeing them secrue sites (banks or online stores) i found this very usefull to me at my work (isp backbone support lol, at the time i was regular support  )

Any way... what u need to do is make a new notepad file and write in it the followng DLL's.. just copy-paste these



regsvr32 SOFTPUB.DLL
regsvr32 WINTRUST.DLL
regsvr32 INITPKI.DLL
regsvr32 dssenh.dll
regsvr32 Rsaenh.dll
regsvr32 gpkcsp.dll
regsvr32 sccbase.dll
regsvr32 slbcsp.dll
regsvr32 Cryptdlg.dll


and save it as > all file types, and make it something like securefix.bat.

then just run the file and ur problem shuld be gone.

How to gain weight in 30 days and how to lose weight fast

How to gain weight in 30 days and how to lose weight fast

Because of the security features built into Windows XP, it is virtually impossible to get back into the system without the password.
You have several options to try and get around this problem.


If you have access to another user account with administrator rights, you can use that account to change the password
of the account that is locked out. You can also use the default Administrator account that is built into Windows XP.

First you need to boot the system into Safe Mode.
1.Restart your system.
2.When you see the blue Dell globe or screen, press the ( F8 ) key about 3 times a second.
3.You should get the Windows startup menu. Use the (Up or Down) arrow keys to highlight (SafeMode)
4.Press (Enter) on (Safe Mode), then press (Enter) on (Windows XP).
5.The system should boot to Safe Mode.

Once you are at the Account Log on Screen, click on the icon
for the user account with administrator rights, or click on the icon
for the administrators account.
Note: For Home the Administrator account isn't normally shown & in Safe Mode you have to press Ctrl+Alt+Delete keys twice to show.
For PRO you can do this in normal mode

When the system has booted to the desktop, use the following steps to change the accounts password.
1.Click Start, Control Panel, Administrative Tools.
2.Click Computer Management.
3.Double click Local Users and Groups, double click the folder Users.
4.Right click on the account name that is locked out, and click on Set Password.
5.You may get a warning message about changing the password, simply click proceed.
6.Leave the New Password box blank, also leave the Confirm Password box blank.
7.Click OK, and OK again.
8.Then close all Windows, reboot the system and try to log in.

Calculating Offsets

How to make kiss and how to make French fries

 Introduction


This tutorial is more of a tip than a tutorial. It just explains how to calculate offsets for jumps and calls within the program you are patching.

Types of Jumps/Calls

Here I will just describe the different types of jumps and calls which you will come across:

Short Jumps
Short jumps be they conditional or unconditional jumps are 2 bytes long (or 1 nibble if your Californian ;-). These are relative jumps taken from the first byte after the two bytes of the jump. Using short jumps you can jump a maximum of 127 bytes forward and 128 bytes backwards.

Long Jumps
Long jumps if they are relative are 6 bytes long for conditional jumps and are 5 bytes long for unconditional jumps. For conditional jumps 2 bytes are used to identify that it is a long jump and what type of jump (je, jg, jns etc) it is. The other 4 bytes are used to show how far away the target location is relative to the first byte after the jump. In an unconditional jump only 1 byte is used to identify it as a long unconditional jump and the other 4 are used to show it's target's relative position, as with the conditional jumps.

Calls
There are two different types of calls which we will use. The normal type of call works the same as the long jumps in that it is relative to it's current position. The other type gives a reference to a memory location, register or stack position which holds the memory location it will call. The position held by the later is direct e.g. the memory location referenced may contain 401036h which would be the exact position that you would call, not relative to the position of the call. The size of these types of calls depends on any calculations involved in the call i.e. you could do: 'call dword ptr [eax * edx + 2]'. Long jumps can also be made using this method, but I didn't say that earlier as to avoid repetition.

Tables
Here is a brief list of all the different types of jumps/calls and their appropriate op-codes. Where different jumps have the same Op-Codes I have grouped them:

Monday, 30 January 2017

COMMUNICATION(BMS&IC NOTES FOR DIPLOMA STUDENTS)

COMMUNICATION

communication is a process of meaningful interaction among individual. It also an exchange of facts,ideas , opinion or emotions ny two or more persons.


special features of communication:-

1. Unavoidable
2. Two way traffic
3.social promotions
4. Continuous process
5. Universal process

sender or source:-

The communication process begins with the sender. Sender wishes to send a message to the receiver . As the source of the message you need to be clear about why you're communicating and what you want to communicate.
message:-The message is a information what sender wants to convey to the receiver.
encoding :- it is a process of putting message in words images or audio to convey to the receiver without any confusion.
channel:- channel is the medium of transmission from one person to another.
decoding:-deciding is the process by which the receiver interprets the message and translate into meaningful information
feedback:- feedback is the reaction provided by the receiver.
  receiver:- the receiver is the person or a group for whom the communication is intended.
context:- it is the situation in which your message is delivered.

channel of communication:-

communication channel simply uses various methods of sending message depending upon the type of information. its importance signifies and amount of information
1. Telephone.
2.radio
3.television
4.E-mails
5.formal printed invitation
6.personal letters
7.post cards
8. Magazine
9.questionnaire
10. Newspaper column

IMPORTANCE'S OF KNOWING YOURSELF( BMS&IC notes for diploma students)

IMPORTANCE'S OF KNOWING YOURSELF
In a process of working together it is very important to understand each other such understanding others depends on one's perception.
people can no longer depend on their intelligence to get things done perception place a vital role in an organization particularly in the fields of recruitment, selection, appraisal , promotions and so on.
The know other concepts basically focus on our ability to manage our self and how we manage relationship with others no other critical success factor that will ensure success in the workplace failure to understand that there friends have different perspectives from theirs.
People need to understand their personal feelings, emotions first before attempting to get things done through others . getting and remaining connected people is the critical for the success of leaders.


process of knowing others:-
1. Perceiving one self accurately
2.Be empathetic
3. Have positive attitude
4.Open communication


INTER GROUP COMMUNICATION:-


inter group communication concerns the way in which communication between peoples affects social relationships. Inter group communication is often characterized by power inequality, bias , competition or conflicts.




Resolving win/lose situation into win/win through inter group communication:-
conflicts arises in group because of the scarcity of freedom , position and resources. People who seek power or status within the group .
In different culture, winning is more acceptable than loosing and competition is more prevalent than co-operation all of which tends to intensity inter group conflicts thus win/lose situation are resolved into win/win through inter group communication.


win/lose:-
In this strategy one party to the conflict tries to marshal all the sources and other partly loses.
examples of win-lose can be found with superior - management relations found in contemporary organization
The negative affect's of win-lose conflicts a groups are
1, divert time and energy from the main issues
2.delay decisions
3, drive unaggressive committee numbers to the sidelines.

Sunday, 29 January 2017

INTRODUCTION TO MANAGEMENT SKILLS and SWOT ANALYSIS

INTRODUCTION TO MANAGEMENT SKILLS:-

INTERPERSONAL SKILL:-

the ability of a person to interact with other people is known as interpersonal skills, it is also refereed
as communication skills.

SOFT SKILLS:-

soft skills are essentially people skills that determine once strength as a listener , leader , communicator and conflict resolver or mediator.

HARD SKILLS:-

Hard skills are the skills that appear on a person education , experience and level of expert.

IMPORTANCE OF SOFT SKILLS:-

soft skills are very important in work place or business because a person who have technical knowledge should also have the ability to express.
                                                                              planning is necessary but education is also important and it takes soft skills to execute any idea.

knowing thyself(self discovery):

knowing thyself or yourself is a life long process. self discovery is a process where we search and identify our strength's weakness , fear and so on. even our personality is made up of many face is that you pick up and reflect from your experience.

IMPORTANCE OF KNOWING YOURSELF:-

  1. helps to control emotions.
  2. helps to take better decisions.
  3. helps to reach your goals.
  4. helps to reach relationship with others
  5. helps to express happiness and joy

PROCESS OF KNOWING YOURSELF:

  • maintain personal dairy : maintaining a dairy helps your likes and dislikes , your positions and what you want to be in the life.
  • meditation : meditation helps you to observe yourself in the present moment practicing meditation helps to reduce your anxiety , vary and excitement.
  • exercise regularly : exercise helps a person physically and mentally its is a kind of meditation.
  • walk regularly : walking is a meditation which helps you to reduce tension and  notice what is going around you.
  • driving or riding : driving is a good process particularly when you find it hard to locate a quite place around you.
  • do some outings : practice a habit of  going put for sight seeing which allows you to be wise your self.
  • develop new interest : allow your self to think something new and different which can take you to sky high in the ladder of your personal and professional  life.

SWOT ANALYSIS :

S --- STRENGTH
W--- WEAKNESS
O --- OPPORTUNITY
T --- THREAT
                                                  swot analysis is an extremely useful for understanding and decision making in all types of situation in an organisation or business , it can be understood as an examination of the organisation internal strengths and weakness and its external opportunity
as well as threat.
                            it is general tool designed to be used in the preliminary  stages of decision making and strategy in various types of applications. this helps you to focus on strengths minimizes weakness and take the greatest possible advantages or opportunity available. swot analysis is an extremely useful for understanding and decision making in all types of situation in an organisation or business , it can be understood as an examination of the organisation internal strengths and weakness and its external opportunity
as well as threat.  it is general tool designed to be used in the preliminary  stages of decision making and strategy in various types of applications. this helps you to focus on strengths minimizes weakness and take the greatest possible advantages or opportunity available. swot analysis is an extremely useful for understanding and decision making in all types of situation in an organisation or business , it can be understood as an examination of the organisation internal strengths and weakness and its external opportunity
as well as threat.


How to become rich fast

 F1 Key Help
F2 Key Edit current Cell
F5 Key Goto
F7 Key Spell Check
F12 Key Save file as
CTRL and A Select entire worksheet.
CTRL and B Toggle Bold Text.
CTRL and C Copies the item or items selected to the Clipboard and can be pasted using CTRL and V.
CTRL and F Displays the Find dialog box.
CTRL and H Displays the Replace dialog box.
CTRL and I Toggles Italic Text.
CTRL and N New File.
CTRL and O Open File.
CTRL and P Print.
CTRL and S Save File.
CTRL and U Toggles Underlined Text.
CTRL and V Paste the contents of the clipboard.
CTRL and X Cut the selected item.
CTRL and Y Redo the last undone action
CTRL and Z Undoes the last action.
CTRL and 1 Displays Format Cells Dialogue Box
CTRL and 5 Toggles Strikethrough Text

Keyboard Shortcuts Result in Excel 2000 - Formulas
ALT and = Autosum
ALT and F8 Macros
CTRL and ; Insert Current Date
CTRL and : Insert Current Time

Keyboard Shortcuts, Microsoft Word

Keyboard Shortcuts, Microsoft Word

 Keyboard Shortcuts Result in Microsoft Word

CTRL and A Selects all in the current document.
CTRL and B Bold text.
CTRL and C Copies the item or text to the Clipboard and can be pasted using CTRL and V.
CTRL and D Displays the Font dialogue box.
CTRL and E Centre Alignment.
CTRL and F Displays the Find dialog box, to search the current document.
CTRL and G Displays the Go to dialog box, to go to a specific location in the current document.
CTRL and H Displays the Replace dialogue box.
CTRL and I Italic text.
CTRL and J Full Justification.
CTRL and K Create Hyperlink
CTRL and L Left Alignment
CTRL and M Tab
CTRL and N Creates a new document.
CTRL and O Displays the Open File dialogue box.
CTRL and P Displays the Print dialog box.
CTRL and R Right Alignment.
CTRL and S Displays the Save dialog box.
CTRL and U Underline text
CTRL and V Pastes the copied item or text from the Clipboard into the current position in the document.
CTRL and X Cuts the item or text selected to the Clipboard.
CTRL and Y Redo the last undone action.
CTRL and Z Undoes the last action.
CTRL and ENTER Insert Page Break.
CTRL and F2 Show Print preview.
CTRL and F4 Closes the active document window.
CTRL and F6 Opens the next document window.

Lots Of Windows Xp Tips

Lots Of Windows Xp Tips, Take A Look !

Lock XP Workstation (#1)

You can lock your XP workstation with two clicks of the mouse. Create a new shortcut on your desktop using a right mouse click, and enter 'rundll32.exe user32.dll, LockWorkStation' in the location field. Give the shortcut a name you like. That's it -- just double click on it and your computer will be locked. And if that's not easy enough, Windows key + L will do the same.

Remove Windows XP system software (#2)

XP hides some system software you might want to remove, such as Windows Messenger, but you can tickle it and make it disgorge everything. Using Notepad or Edit, edit the text file /windows/inf/sysoc.inf, search for the word 'hide' and remove it. You can then go to the Add or Remove Programs in the Control Panel, select Add/Remove Windows Components and there will be your prey, exposed and vulnerable.

New commands (#3)

For those skilled in the art of DOS batch files, XP has a number of interesting new commands. These include 'eventcreate' and 'eventtriggers' for creating and watching system events, 'typeperf' for monitoring performance of various subsystems, and 'schtasks' for handling scheduled tasks. As usual, typing the command name followed by /? will give a list of options -- they're all far too baroque to go into here.

Windows XP supports IPv6 (#4)

XP has IP version 6 support -- the next generation of IP. Unfortunately this is more than your ISP has, so you can only experiment with this on your LAN. Type 'ipv6 install' into Run... (it's OK, it won't ruin your existing network setup) and then 'ipv6 /?' at the command line to find out more. If you don't know what IPv6 is, don't worry and don't bother.

Linking Your Xbox To Your Computer

Linking Your Xbox To Your Computer

I. Introduction

Some basics and assumptions (the more you know, the more you UNDERSTAND):

Crossover cable: A crossover cable is needed to directly connect your computer and Xbox. You would plug one end of the cable to your computer and the other end into the Xbox, there are no devices in between. If you have a hub, switch, or router you will not need a crossover cable though some still will work with one. With connecting to hubs, switches, or routers you should use a straight-through cable. The image below shows the difference between the two:

To easily tell if you have a crossover or not, simply look at the two ends side by side. If all the pins, 1 through 8 on both ends are all the same color in the same order, you have a straight-through cable. If pins 1, 3 and 2, 6 are swapped you have a crossover cable. Notice the TX, RX as well. This shows why in pc to pc connections a crossover is required. Otherwise one pc will be transmitting over the same wire the other pc is trying to transmit on.

This guide currently gives configuration examples for setting up an FTP connection with Evox, Avalaunch, MXM, or UnleashX as your dash. It is also recommended to use FlashFXP as your FTP client though many others will work just fine.
You do not NEED an internet connection to FTP to your Xbox. When you ftp to your Xbox from a computer in your house to the Xbox in your house, no packets (data) need to go out to the internet and they shouldn't even try. The tricky part is when you want to be able to access the internet and ftp to your Xbox at the same time. How this is done and how difficult it is depends on the devices you have.
I will not list every baby step involved for how to set things, like every mouse click required. If you're not sure how to do something I've said to configure, see number 5 below.
If something is said in this guide that you don't understand or don't know how to accomplish it, try google. It is a search engine at http://www.google.com
For example, if I say "Run a command prompt" but don't mention how; don't go immediately posting in the forums asking how you run a command prompt. First, try searching in google, "how to run command prompt windows xp". I'm willing to bet you'll get your answer faster. Another example, just so we're clear, if I say "turn off your winxp firewall", you may search in google, "how to turn off windows xp firewall". Again, I'm betting your answer will come faster.
This guide now has configuration diagrams to help anyone having difficulty understanding the configuration examples I discuss. Some people simply do better with visuals. The key for the diagrams is provided

SHORTCUTS OF Windows

 SHORTCUTS OF Windows

CTRL+C (Copy)
CTRL+X (Cut)
CTRL+V (Paste)
CTRL+Z (Undo)
DELETE (Delete)
SHIFT+DELETE (Delete the selected item permanently without placing the item in the Recycle Bin)
CTRL while dragging an item (Copy the selected item)
CTRL+SHIFT while dragging an item (Create a shortcut to the selected item)
F2 key (Rename the selected item)
CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next word)
CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous word)
CTRL+DOWN ARROW (Move the insertion point to the beginning of the next paragraph)
CTRL+UP ARROW (Move the insertion point to the beginning of the previous paragraph)
CTRL+SHIFT with any of the arrow keys (Highlight a block of text)
SHIFT with any of the arrow keys (Select more than one item in a window or on the desktop, or select text in a document)
CTRL+A (Select all)
F3 key (Search for a file or a folder)
ALT+ENTER (View the properties for the selected item)
ALT+F4 (Close the active item, or quit the active program)
ALT+ENTER (Display the properties of the selected object)
ALT+SPACEBAR (Open the shortcut menu for the active window)
CTRL+F4 (Close the active document in programs that enable you to have multiple documents open simultaneously)
ALT+TAB (Switch between the open items)
ALT+ESC (Cycle through items in the order that they had been opened)
F6 key (Cycle through the screen elements in a window or on the desktop)
F4 key (Display the Address bar list in My Computer or Windows Explorer)
SHIFT+F10 (Display the shortcut menu for the selected item)
ALT+SPACEBAR (Display the System menu for the active window)
CTRL+ESC (Display the Start menu)
ALT+Underlined letter in a menu name (Display the corresponding menu)
Underlined letter in a command name on an open menu (Perform the corresponding command)
F10 key (Activate the menu bar in the active program)
RIGHT ARROW (Open the next menu to the right, or open a submenu)
LEFT ARROW (Open the next menu to the left, or close a submenu)
F5 key (Update the active window)
BACKSPACE (View the folder one level up in My Computer or Windows Explorer)
ESC (Cancel the current task)
SHIFT when you insert a CD-ROM into the CD ROM

about mail

Introduction


Mail is the first software that let you store and share files on any web-mail account. If you have a web mail account with large storage space, you can use P2M to store files on it. Web-mail providers such as Gmail (Google Mail), Walla!, Yahoo and more, provide storage space that ranges from 100MB to 2GB.
P2M splits the file you want to share/store zips and encrypts it. P2M then sends the file segments one by one to your account. Once P2M uploaded all file segments, you can download them and use P2M to merge the segments back to the original file.


u can get the software from here


http://www.peer2mail.com/P2MSetup.exe


and for any info u can log to there website

http://www.peer2mail.com



How to upload a file to ur e-mail account ?


In order to send a file to an email account, Peer2Mail needs to split it into segments. Web-mail providers limit the size of an email attachment usually to a nominal 10Megs

There are 3 ways u can send ur files to the e-mail:

    *  Direct Send - P2M has a built in SMTP component that sends the segments directly to the web-mail providers. You don't need to enter your ISP details in order to use P2M. If you are using this feature please make sure you enter a value in the 'From Email Address' because some web-mail providers reject email messages where there is no 'From' address. You can even enter a fake mail address.
    * Send Via MAPI - P2M can send the segments using MAPI (Usually your outlook client). When you use this option P2M will split the files and move the sending responsibility to Outlook. Note that it will use your ISP SMTP server and details to send the files. You may enter as many recipients as you wish when using this option.
    * Send Via SMTP Server - Send the segments using your ISP SMTP Server. If you are using this feature please make sure you enter a value in the 'From Email Address' because some web-mail providers reject email messages where there is no 'From' address. You can even enter a fake mail address. You may enter as many recipients as you wish when using this option.

Play Games On PS2 Without ModChip

 Play Games On PS4 Without ModChip

In this guide, you will learn the very easy method of making copies of your PS2 and normal Playstaion games so that they are playable on the PS2. This guide will provide you with all the information you need to burn PS2 games.
You will need the following things to burn PS2 games:
a computer with a cd burner
a blank cd-r (don't use the re-recordable type a.k.a. cd-rw)
CDRWIN – The version in this guide is 3.8D
FireBurner –
PS2 patcher –
GameShark 2 for PS2 - the GameShark 2 is available at most stores that sell video games, a few examples would be Best Buy, Circuit City, or Target. You want version 1.0 of the GameShark 2. I have heard that all other versions work, but I have only tested version 1.0. GameShark2 costs about 29.95. Believe me, its worth it!!!
and a PS2 to play the games.
Burning the PS2

The process of burning ps2 games is easy. It is really only a 3 step process.(read the game, patch the game, and burn the game.)

1) insert game into cd drive.

2) Open up CDRWIN and click on the extract disk/tracks/sectors button.

3) Your settings should be as follows:

For “extract mode” select disk image/ cue sheet
For “read options” select “raw”
For “error recovery” select “abort”
For “jitter correction” select “auto”
For “subcode analysis” select “auto”
Data Speed and Audio Speed should be the same
For “read retry count” type 0
For “subcode threshold” type 300
Make sure you selected the drive that your PS2 game is in

PORT NUMBERS

Port Numbers

PORT NUMBERS

The port numbers are divided into three ranges: the Well Known Ports,
the Registered Ports, and the Dynamic and/or Private Ports.

The Well Known Ports are those from 0 through 1023.

The Registered Ports are those from 1024 through 49151

The Dynamic and/or Private Ports are those from 49152 through 65535


************************************************************************
* PLEASE NOTE THE FOLLOWING: *
* *
* 1. UNASSIGNED PORT NUMBERS SHOULD NOT BE USED. THE IANA WILL ASSIGN *
* THE NUMBER FOR THE PORT AFTER YOUR APPLICATION HAS BEEN APPROVED. *
* *
* 2. ASSIGNMENT OF A PORT NUMBER DOES NOT IN ANY WAY IMPLY AN *
* ENDORSEMENT OF AN APPLICATION OR PRODUCT, AND THE FACT THAT NETWORK *
* TRAFFIC IS FLOWING TO OR FROM A REGISTERED PORT DOES NOT MEAN THAT *
* IT IS "GOOD" TRAFFIC. FIREWALL AND SYSTEM ADMINISTRATORS SHOULD *
* CHOOSE HOW TO CONFIGURE THEIR SYSTEMS BASED ON THEIR KNOWLEDGE OF *
* THE TRAFFIC IN QUESTION, NOT WHETHER THERE IS A PORT NUMBER *
* REGISTERED OR NOT. *
************************************************************************


WELL KNOWN PORT NUMBERS

The Well Known Ports are assigned by the IANA and on most systems can
only be used by system (or root) processes or by programs executed by
privileged users.

Ports are used in the TCP [RFC793] to name the ends of logical
connections which carry long term conversations. For the purpose of
providing services to unknown callers, a service contact port is
defined. This list specifies the port used by the server process as
its contact port. The contact port is sometimes called the
"well-known port".

To the extent possible, these same port assignments are used with the
UDP [RFC768].

The range for assigned ports managed by the IANA is 0-1023.

Port Assignments:

Procedure used to recover data from a quick-erased CD-RW disc

 Procedure used to recover data from a quick-erased CD-RW disc

1. Make a file of exactly the size of the cdrw disc's capacity (650MB in my case).
(this step may not be needed)

2. With Nero I created a new project and added the file to it so that I have the disc filled. I gues you can also fill up the disc with other files.
The reason why I fill the disc is because I want Nero to make a session that uses the entire disc. Like I wrote earlier in this thread I experienced that my CD-Drive refuses to read off the disc beyond the session's boundaries. When you quick-erase a disc there is no session anymore so the drive will not read at all. Burning a new session will overwrite the data and burning only a small session will NOT make the drive read the other data that is still on the disc.
The reason why I used the one big file is so that I could later on recognize which part of the disc was overwritten by this file because this file contained all zeros (0x00).

3. I pressed burn and selected disc-at-once. Then while Nero was burning the leadin I pressed cancel. My CD-Drive finished writing the lead-in and Nero reported an error.
This is what was accomplished however: Now the disc contains a session that says that the used disc size is the complete disc. Nero did not get to writing file because I cancelled it. Good thing because I don't want Nero to write any files because my old data will get overwritten!
I gues it works the same with different writing software. Another method that I used during a test was simply press the reset button of the computer when the burning software was done with writing the lead-in and started with the files.

4. I had to restart the computer after cancelling burning.
With the cdrw disc inserted I saw in "my computer" that windows recognized that the disc was 650MB, clicking on it gave an error. Good so far!

Now with IsoBuster you can extract the sectors from a disc to a file. This is what I did.
I gues that if you have data-recovery software at this point it will be usefull because now (if all went well;)) the CD-Drive WILL read data from the entire disc. Anyway, I used ISO-Buster because the files that I needed to recover where a bit odd for nowadays (.XM, .S3M, .MP3):
In IsoBuster I had to do several steps

Registry Disassembled a basic tutorial



Registry Disassembled a basic tutorial

The registry is a hierarchical database that contains virtually all information about your computer's configuration. Under previous version of Windows, those setting where contained in files like config.sys, autoexec.bat, win.ini, system.ini, control.ini and so on. From this you can understand how important the registry is. The structure of the registry is similar to the ini files structure, but it goes beyond the concept of ini files because it offers a hierarchical structure, similar to the folders and files on hard disk. In fact the procedure to get to the elements of the registry is similar to the way to get to folders and files.
In this section I would be examing the Win95\98 registry only although NT is quite similar.

The Registry Editor
The Registry Editor is a utility by the filename regedit.exe that allows you to see, search, modify and save the registry database of Windows. The Registry Editor doesn't validate the values you are writing: it allows any operation. So you have to pay close attention, because no error message will be shown if you make a wrong operation.
To launch the Registry Editor simply run RegEdit.exe ( under WinNT run RegEdt32.exe with administer privileges).
The registry editor is divided into two sectios in the left one there is a hierarchical structure of the database (the screen looks like Windows Explorer) in the right one there are the values.

The registry is organized into keys and subkeys. Each key contains a value entry , each one has a name, a type or a class and the value itself. The name is a string that identifies the value to the key. The length and the format of the value is dependent on the data type.

As you can see with the Registry Editor, the registry is divided into five principal keys: there is no way to add or delete keys at this level. Only two of these keys are effectively saved on hard disk: HKEY_LOCAL_MACHINE and HKEY_USERS. The others are jusr branches of the main keys or are dynamically created by Windows.

HOW TO RESET YOUR LOST BIOS PASSWORD

Here's a DOS trick for Windows 9x, that will reset (delete) your motherboard's BIOS password (aka CMOS password) without any need to open up your computer to remove the battery or mess with jumpers.

This method can come in very handy in the event you ever lose and forget your BIOS password or if you acquire used computers where the unknown previous owners had BIOS passwords set (in fact, this happened to me long ago—I was given a used computer, but there was no way I could enter the CMOS to make changes). It's important to note here that the password we are talking about is only the one that prevents a user from entering the BIOS setup at bootup, not the one that stops you from getting past the boot.

Normally, at bootup you can press a key (usually the DEL key) to access your BIOS allowing you to view it or make changes. With a password set, there is no way to enter setup. Though a password can provide a basic and very effective level of PC security, losing it can be a real headache if you don't know how to fix the problem.

The MS-DOS command that will makes this trick possible is the DEBUG command (debug itself is a utility—debug.exe—which is located in your Windows Command folder). This is not a command to be taken lightly—in other words, it's not a command to play with! You can cause serious corruption with this command and can end up not being able to even boot your computer! Debug is used to work with binary and executable files and allows you to alter (hex edit) the contents of a file or CPU register right down to the binary and byte level.

To begin debug mode, type debug at a MS-DOS prompt or you can specify a file, i.e., DEBUG FILE.EXE. There is a difference in screen output between the two methods. When you type DEBUG alone, debug responds with a hyphen (-) prompt waiting for you to enter commands. The second method, with a file specified, loads the file into memory and you type all the commands on the line used to start debug. In this tip, we will be writing to the BIOS, so the first method is the one that would be used. All debug commands can be aborted at any time by pressing CTRL/C.

JPG,JPEG,JPE File associations fixes

 JPG,JPEG,JPE File associations fixes

This reg file will restore the default file associations.
1. Copy the following (everything in the box) into notepdad.
QUOTE
Windows Registry Editor Version 5.00
[HKEY_CLASSES_ROOT\.jpe]
"PerceivedType"="image"
@="jpegfile"
"Content Type"="image/jpeg"
[HKEY_CLASSES_ROOT\.jpe\OpenWithProgids]
"jpegfile"=hex(0):
[HKEY_CLASSES_ROOT\.jpe\PersistentHandler]
@="{098f2470-bae0-11cd-b579-08002b30bfeb}"
[HKEY_CLASSES_ROOT\.jpeg]
"PerceivedType"="image"
@="jpegfile"
"Content Type"="image/jpeg
[HKEY_CLASSES_ROOT\.jpeg\jpegfile]
[HKEY_CLASSES_ROOT\.jpeg\jpegfile\ShellNew]
[HKEY_CLASSES_ROOT\.jpeg\OpenWithProgids]
"jpegfile"=hex(0):
[HKEY_CLASSES_ROOT\.jpeg\PersistentHandler]
@="{098f2470-bae0-11cd-b579-08002b30bfeb}"
[HKEY_CLASSES_ROOT\.jpg]
"PerceivedType"="image"
@="jpegfile"
"Content Type"="image/jpeg"

REVERSE CODING

REVERSE CODING

# Released by Cybnet Security Group
# legalz: modify and use at will, if you make any changes, improvements, updates or use the code
# in another project, please send us what you did and give credit
# if you have any questions, post them at forum.hackerthreads.net
# be sure to check out hackerthreads.org for updates and new tutorials/downloads

Index:
1.Introduction
2.Disclaimer
3.Hexadecimal
4.RAM and ROM
5.ASM
6.Needed programs
7.Cracking
8.Conclusion
---------------------------
---Introduction----------

Welcome to my Reverse Coding tutorial! In this paper, you will
learn how to crack and modify your own software. I'll try to get
into as much detail as possible, yet also dumb it down a bit. =)
------------------------------------------------------------------------------------------------------
---Disclaimer------------

All information is purely for educational purposes only! The author
cannot be held responsible for any (ab)use of this information.
USE AT YOUR OWN RISK!!!
------------------------------------------------------------------------------------------------------
---Hexadecimal----------

To begin, I'm going to teach you about hexadecimal, so if you already
know it, then move on. Even if you do already know it, I suggest
sticking around for a refreshment of your memory.=)

WINDOWS SHORTCUT

WINDOWS SHORTCUT

Run Commands:

compmgmt.msc - Computer management
devmgmt.msc - Device manager
diskmgmt.msc - Disk management
dfrg.msc - Disk defrag
eventvwr.msc - Event viewer
fsmgmt.msc - Shared folders
gpedit.msc - Group policies
lusrmgr.msc - Local users and groups
perfmon.msc - Performance monitor
rsop.msc - Resultant set of policies
secpol.msc - Local security settings
services.msc - Various Services
msconfig - System Configuration Utility
regedit - Registry Editor
msinfo32 _ System Information
sysedit _ System Edit
win.ini _ windows loading information(also system.ini)
winver _ Shows current version of windows
mailto: _ Opens default email client
command _ Opens command prompt


Run Commands to access the control panel:

Add/Remove Programs control appwiz.cpl
Date/Time Properties control timedate.cpl
Display Properties control desk.cpl
FindFast control findfast.cpl
Fonts Folder control fonts
Internet Properties control inetcpl.cpl
Keyboard Properties control main.cpl keyboard
Mouse Properties control main.cpl
Multimedia Properties control mmsys.cpl
Network Properties control netcpl.cpl
Password Properties control password.cpl
Printers Folder control printers
Sound Properties control mmsys.cpl sounds
System Properties control sysdm.cpl

ABOUT INTERNET OF THINGS

ABOUT INTERNET OF THINGS

The Internet is a computer network made up of thousands of networks worldwide. No one knows exactly how many computers are connected to the Internet. It is certain, however, that these number in the millions.

No one is in charge of the Internet. There are organizations which develop technical aspects of this network and set standards for creating applications on it, but no governing body is in control. The Internet backbone, through which Internet traffic flows, is owned by private companies.

All computers on the Internet communicate with one another using the Transmission Control Protocol/Internet Protocol suite, abbreviated to TCP/IP. Computers on the Internet use a client/server architecture. This means that the remote server machine provides files and services to the user's local client machine. Software can be installed on a client computer to take advantage of the latest access technology.

An Internet user has access to a wide variety of services: electronic mail, file transfer, vast information resources, interest group membership, interactive collaboration, multimedia displays, real-time broadcasting, shopping opportunities, breaking news, and much more.

The Internet consists primarily of a variety of access protocols. Many of these protocols feature programs that allow users to search for and retrieve material made available by the protocol.

COMPONENTS OF THE INTERNET

WORLD WIDE WEB

The World Wide Web (abbreviated as the Web or WWW) is a system of Internet servers that supports hypertext to access several Internet protocols on a single interface. Almost every protocol type available on the Internet is accessible on the Web. This includes e-mail, FTP, Telnet, and Usenet News. In addition to these, the World Wide Web has its own protocol: HyperText Transfer Protocol, or HTTP. These protocols will be explained later in this document.

The World Wide Web provides a single interface for accessing all these protocols. This creates a convenient and user-friendly environment. It is no longer necessary to be conversant in these protocols within separate, command-level environments. The Web gathers together these protocols into a single system. Because of this feature, and because of the Web's ability to work with multimedia and advanced programming languages, the Web is the fastest-growing component of the Internet.

Home automation using Arduino UNO


Home automation using Arduino UNO:

Components:
There are main three components required in this project:

 Arduino UNO
 TSOP 1738
 RC-5 Remote control

1. ARDUINO UNO 1.1 Introduction to Arduino UNO Fig.1.1 Arduino UNO Board Arduino is a popular open-source single-board microcontroller, descendant of the open-source Wiring platform, designed to make the process of using electronics in multidisciplinary projects more accessible. The hardware consists of a simple open hardware design for the Arduino board with an Atmel AVR processor and on-board input/output support. The software consists of a standard programming language compiler and the boot loader that runs on the board. Arduino hardware is programmed using a Wiring-based language (syntax and libraries), similar to C++ with some slight simplifications and modifications, and a Processing-based integrated development environment. Current versions can be purchased pre-assembled;. Additionally, variations of the Italian-made Arduino—with varying levels of compatibility—have been released by third parties; some of them are programmed using the Arduino software.The Arduino project received an honorary mention in the Digital Communities category at the 2006 Prix Ars Electronica.


An Arduino board consists of an 8-bit Atmel AVR microcontroller with complementary components to facilitate programming and incorporation into other circuits. An important aspect of the Arduino is the standard way that connectors are exposed, allowing the CPU board to be connected to a variety of interchangeable add-on modules known as shields. Official Arduinos have used the megaAVR series of chips, specifically the ATmega8, ATmega168, ATmega328, ATmega1280, and ATmega2560. A handful of other processors have been used by Arduino compatibles. Most boards include a 5 volt linear regulator and a 16 MHz crystal oscillator (or ceramic resonator in some variants), although some designs such as the LilyPad run at 8 MHz and dispense with the onboard voltage regulator due to specific form-factor restrictions. An Arduino's microcontroller is also pre-programmed with a boot loader that simplifies uploading of programs to the on-chip flash memory, compared with other devices that typically need an external programmer. At a conceptual level, when using the Arduino software stack, all boards are programmed over an RS-232 serial connection, but the way this is implemented varies by hardware version. Serial Arduino boards contain a simple inverter circuit to convert between RS-232-level and TTL-level signals. Current Arduino boards are programmed via USB, implemented using USB-to-serial adapter chips such as the FTDI FT232. Some variants, such as the Arduino Mini and the unofficial Boarduino, use a detachable USB-to-serial adapter board or cable, Bluetooth or other methods. (When used with traditional microcontroller tools instead of the Arduino IDE, standard AVR ISP programming is used. The Arduino board exposes most of the microcontroller's I/O pins for use by other circuits. The Diecimila, now superseded by the Duemilanove, for example, provides 14 digital I/O pins, six of which can produce pulse-width modulated signals, and six analog inputs. These pins are on the top of the board, via female 0.1 inch headers. 

DSP LAB PROGRAM'S PART-A

DSP LABA List of Experiments Using MATLAB/ Code Composer Studio and Objectives.

1.    Verification of sampling theorem.
2.    Impulse response of a given system.
3.    Linear convolution of two given sequences.
4.    Circular convolution of two given sequences.
5.    Autocorrelation of a given sequence and verification of its properties.
6.    Cross correlation of given sequences and verification of its properties.
7.    Solving a given difference equation. 
8.    Computation of N point DFT of a given sequence and to plot magnitude and phase spectrum.
9.    Linear convolution of two sequences using DFT and IDFT.
10. Circular convolution of two given sequences using DFT and IDFT
11. Design and implementation of FIR filter to meet given specifications.
12. Design and implementation of IIR filter to meet given specifications.

 B. LIST OF EXPERIMENTS USING DSP PROCESSOR

1.    Linear convolution of two given sequences.
2.    Circular convolution of two given sequences.
3.    Impulse response of a given system.
4.    Difference Equations. 

PART-A
EXPERIMENTS USING MAT LAB


01a.Program to Verify Sampling Theorem. Ex: x(t)=sin(2π100t).

dt=.001;
t=.01:dt:.02;
%fm=input('enter i/p signal freq:');
xi=sin(2*pi*100*t);
%fs=input('enter the sampling frequency:');
fs=1000;
ps=1/fs;
n=0:1:50;
xs=sin(2*pi*100*(n*ps));
nps=n*ps;
xr=xs*sinc(fs*(ones(length(n),1)*t-nps'*ones(1,length(t))));
figure(1);
subplot(3,1,1);plot(t,xi);
subplot(3,1,2);stem(n,xs);
subplot(3,1,3);plot(t,xr);

MAT LAB PROGRAM'S PART2


Program to plot the curve for equation y=sin(x)+cos(x) as x varies from 0 to 2*pi


x=0:10:340;
y=sind(x)+cosd(x);
plot (x,y);
xlabel('angle in degree');
ylabel('magnitude');
title('curve for the equation y=sin(x)+cos(x)');


program to generate two sinusoids and computation of their product


t=0:0.001:0.1;
f1=input('enter the freq of first sinusoid');
f2=input('enter the freq of second sinusoid');
y1=sin(2*pi*f1*t);
y2=sin(2*pi*f2*t);
y=y1.*y2;
p1=fft(y1);
p2=fft(y2);
p3=fft(y);

subplot(2,2,1)
plot(y1)
xlabel('time');
ylabel('amplitude');
title('first sinusoid in time domain');

subplot(2,2,2)
plot(y2)
xlabel('time');
ylabel('amplitude');
title('second sinusoid in time domain');

subplot(2,2,3)
plot(abs(p1))
xlabel('time');
ylabel('magnitude');
title('first sinusoid in freq domain');



subplot(2,2,4)
plot(abs(p2))
xlabel('time');
ylabel('magnitude');
title('second sinusoid in freq domain');


figure,subplot(2,1,1)
plot(y1)
xlabel('time');
ylabel('amplitude');
title('product of two sinusoids in time domain');

subplot(2,1,2)
plot(abs(p3))
xlabel('time');
ylabel('amplitude');
title('product of two sinusoids in freq domain');