Receive Daily Updates

Enter your email address:

Showing newest 20 of 26 posts from 5/1/08 - 6/1/08. Show older posts
Showing newest 20 of 26 posts from 5/1/08 - 6/1/08. Show older posts

Thursday, May 29, 2008

how to make lightning flash

how to make lightning flash

(note- you need the lightning brushes for this trick, check it out at deviantart)

1) first make a background (a dark one is preferable.)

Image

2) make a new layer, and add a lightning brush

Image

(if you want, you can remove some of the glow and lower the opacity.)

3) once your satisfied, his ctrl+shift+m to animate. Something like this should show up.

Image

4) Then go to the animation menu. (if it doesn’t appear go to windows>animation.)

Image

5) Then make the lightning image invisible.

Image

6) Then duplicate the layer and make the lightning visible in that slide.

Image

7) Duplicate the lightning layer and make it invisible. Then select the lightning slide and press the tweening button.

Image

Cool A screen like this should pop up, select these settings.

Image

9) Now repeat the process, only this time make a delay of 0.1-0.3 seconds on the slide with the lightning. You should get something like this.

Image

10) Now go back to the first slide and give it a 1-10 second delay so that it’s realistic. Press play to test it out.

Image

Here’s what I got.

Image

Now use that animation technique on different backgrounds and with different settings.

read more "how to make lightning flash"

Wednesday, May 28, 2008

NETBIOS HACKING

NETBIOS HACKING - BREAKING INTO SYSTEM

-What is it?-

NetBIOS Hacking is the art of hacking into someone else's computer through your computer. NetBIOS stands for "Network Basic Input Output System." It is a way for a LAN or WAN to share folders, files, drives, and printers.

-How can this be of use to me?-
Most people don't even know, but when they're on a LAN or WAN they could possibly have their entire hard drive shared and not even know. So if we can find a way into the network, their computer is at our disposal.

-What do I need?-
Windows OS
Cain and Abel - get it from here - http://www.oxid.it/

++++++++++++++++++++++++++++++++++++++++++++++++++
-[Step 1, Finding the target.]-
++++++++++++++++++++++++++++++++++++++++++++++++++
So first off we need to find a computer or the computer to hack into. So if your plugged in to the LAN, or connected to the WAN, you can begin. Open up Cain and Abel. This program has a built in sniffer feature. A sniffer looks for all IP addresses in the local subnet. Once you have opened up the program click on the sniffer tab, click the Start/Stop sniffer, and then click the blue cross




-What is it?-
NetBIOS Hacking is the art of hacking into someone else's computer through your computer. NetBIOS stands for "Network Basic Input Output System." It is a way for a LAN or WAN to share folders, files, drives, and printers.

-How can this be of use to me?-
Most people don't even know, but when they're on a LAN or WAN they could possibly have their entire hard drive shared and not even know. So if we can find a way into the network, their computer is at our disposal.

-What do I need?-
Windows OS
Cain and Abel - get it from here
CODE
http://www.oxid.it/
++++++++++++++++++++++++++++++++++++++++++++++++++
-[Step 1, Finding the target.]-
++++++++++++++++++++++++++++++++++++++++++++++++++

So first off we need to find a computer or the computer to hack into. So if your plugged
in to the LAN, or connected to the WAN, you can begin.
Open up Cain and Abel. This program has a built in sniffer feature. A sniffer looks for
all IP addresses in the local subnet. Once you have opened up the program click on the
sniffer tab, click the Start/Stop sniffer, and then click the blue cross




Another window will pop up, make sure "All host in my subnet" is selected, and then click ok.



It should begin to scan.



Then IP's, computer names, and mac addresses will show up.
Now remember the IP address of the computer you are going to be breaking into.
If you can't tell whether the IP address is a computer, router, modem, etc, that's ok.
During the next step we will begin our trial and error.





++++++++++++++++++++++++++++++++++++++++++++++++++
-[Part 2, Trial and Error]-
++++++++++++++++++++++++++++++++++++++++++++++++++

Now, we don't know if we have our designated target, or if we have a computer or printer, or whatever else is on the LAN or WAN.
If you did get the IP of the target though, I still recommend reading through this section, for it could be helpful later on.
Click on the start menu and go to run, type in cmd, and click ok.
This should bring up the command prompt.
From here we will do most of the hacking.
Now I will be referring to certain commands that need to be inputted into the command prompt.
I will put these commands in quotes, but do not put the quotes in the code when you type it into the prompt.
I am only doing this to avoid confusion.
Let's get back to the hacking.
Type in "ping (IP address of the target)." For example in this tutorial, "ping 192.168.1.103."
This will tell us if the target is online.
If it worked, it will look something like this (note, I have colored out private information):





IF it didn't work, meaning that the target is not online, it will look something like this:





If the target is not online, either switch to a different target, or try another time. If the target is online, then we can proceed.


++++++++++++++++++++++++++++++++++++++++++++++++++
-[Part 3, Gathering the Information.]-
++++++++++++++++++++++++++++++++++++++++++++++++++

Now, input this command "nbtstat –a (IP address of target)." An example would be "nbtstat –a 192.168.1.103."
This will show us if there is file sharing enabled, and if there is, it will give us the: currently logged on user, workgroup, and computer name.




Ok, you're probably wondering, "What does all this mean to me?" Well, this is actually very important, without this, the hack would not work. So, let me break it down from the top to bottom. I will just give the first line of information, and then explain the paragraph that follows it.

The information right below the original command says: "Local Area Connection," this information tells us about our connection through the LAN, and in my case, I am not connected through LAN, so the host is not found, and there is no IP.

The information right below the "Local Area Connection," is "Wireless Network Connection 2:" It gives us information about the connection to the target through WAN. In my case I am connected through the WAN, so it was able to find the Node IpAddress. The Node IpAddress is the local area IP of the computer you are going to break into.

The NetBIOS Remote Machine Name Table, give us the workgroup of our computer, tells us if it is shared, and gives us the computer name. Sometimes it will even give us the currently logged on user, but in my case, it didn't. BATGIRL is the name of the computer I am trying to connect to. If you look to the right you should see a <20>. This means that file sharing is enabled on BATGIRL. If there was not a <20> to the right of the Name, then you have reached a dead end and need to go find another IP, or quit for now. Below BATGIRL is the computers workgroup, SUPERHEROES. If you are confused about which one is the workgroup, and the computer, look under the Type category to the right of the < > for every Name. If it says UNIQUE, it is one system, such as a printer or computer. If it is GROUP, then it is the workgroup


++++++++++++++++++++++++++++++++++++++++++++++++++
-[Step 4, Breaking In]-
++++++++++++++++++++++++++++++++++++++++++++++++++

Finally it's time.
By now we know: that our target is online, our target has file sharing, and our target's computer name.
So it's time to break in.
We will now locate the shared drives, folders, files, or printers. Type in "net view \\(IP Address of Target)"
An example for this tutorial would be: "net view \\192.168.1.103




We have our just found our share name. In this case, under the share name is "C," meaning that the only shared thing on the computer is C. Then to the right, under Type, it says "Disk." Thismeans that it is the actual C DISK of the computer. The C DISK can sometimes be an entire person's hard drive.

All's that is left to do is "map" the shared drive onto our computer. This means that we will make a drive on our computer, and all the contents of the targets computer can be accessed through our created network drive. Type in "net use K: \\(IP Address of Target)\(Shared Drive). For my example in this tutorial, "net use K: \\192.168.1.103\C." Ok, let's say that you plan on doing this again to a different person, do u see the "K after "net use?" This is the letter of the drive that you are making on your computer. It can be any letter you wish, as long as the same letter is not in use by your computer. So it could be "net use G...," for a different target.



As you can see, for my hack I have already used "K," so I used "G" instead.

You may also do the same for multiple hacks.
If it worked, it will say "The command completed successfully."
If not, you will have to go retrace you steps.
Now open up "my computer" under the start menu, and your newly created network drive should be there.




Now, if you disconnect from the WAN or LAN, you will not be able to access this drive, hence the name Network Drive.
The drive will not be deleted after you disconnect though, but you won't be able to access it until you reconnect to the network.
So if you are doing this for the content of the drive, I recommend dragging the files and folders inside of the drive onto your computer,
because you never know if the target changes the sharing setting.
If you are just doing this to hack something, then go explore it and have some well deserved fun!

By ARUSH.SAL
read more "NETBIOS HACKING"

Tuesday, May 27, 2008

The Geforce 9600GT 512 Mb Reviewed


Geforce 9600GT 512 Mb

Last month the first in the new NVIDEA 9000 series was launched. The GeForce 9600GT 512 Mb is the first of this new line that saw the light.


This new line of has to replace the whole NVIDIA assortment before summer. It's six moths ago that we had our first view of the 8000 series, so things are moving quickly at this company

We tested the first sibling in this new range of graphics cards the 9600GT. In itself the fact the NVIDIA made the debut with the 9600GT model is unique. Mostly the high end super gaming monsters are the first to see the light. This is a middle class model but has is build around the new G94 GPU, and will be one of the few cards featuring this chip. Both the 9800GT and 9800GTX will be based on the G92 GPU.

The overall design is no revolution. Improvements in performance are great, and the price/quality ratio has gone up. But from a technical point of view there is not much new under the sun.

Both the G94 and G92 GPU's don't support DirectX 10.1 like their competitor Ati Radion with the 3000 series. If this lack of support is a great drawback remains to be seen. Their are no games supporting 10.1 and since the shelf life of a graphics card in the gaming sector is less than 6 months we need not be overcritical at this point.

Both GPU's support PCI 2.0 and Pure Video 2 ( we had already seen this in the G84 and G86). But the new cards are cheaper, faster and have a better energy efficiency.

Although the 9000 series is not the most innovative, fact remains that they are interesting cards. If we compare the new GT9600 with the GT8600 (based on the G84 GPU).

The 9600 stands out with an 256 bits memory bus, while the 8600 had to work with half that amount, 128 bits. That this increase has pronounced effect on the performance stands to reason.

Where the GeForce 8600 had a maximum bandwidth of 32GB/sec the 9600 is capable of 57.6 GB/sec. Further the number of shader processors is doubled compared to the GPU84.

The clock of the 64 unified shaders increased from 1450 Mhz, to 1625 Mhz. The conclusion of this move is that Nvidea now has found a healthy balans between GPU power and memory bandwidth.

The 9600GT has two Dual-Link DVI connections, both HDCP capable. Dell is the only manufacturer that has a display capable of utilizing that possibility with their 24 Inch 2408WP and 30 Inch 3008WFP. Other companies promised to come with compatible models later this year.

Decoding HD imagery is no problem, so blue ray enthusiasts can rest assured. The GT9600 can be placed in double SLI. and beats its competitor the HD 3870 from Ati Radeon on all fronts. Tripple SLI is not possible but we have the feeling that not many of the potential buyers of this card will be interested in such a feature.

A comparison table for different games and resolutions can be found on our site. A strange phenomenon is that the overall energy consumption of the HD3870 X2 is higher with less performance.

To wrap it up, we think that a complete new line in 6 months time is a bit overdoing it, but that NVIDIA did a good job with the Geforce 9600GT 512 Mb. The great never seen before price/performance ratio is the and the consistent beating of the 3870 from Ati makes this card a great choice for the demanding but not overly fanatic gamer.

As soon as we can lay our hands on the 9800 models with will very happy to give them a good spin and find out what their extremes are. With our strange inclination we love to put new cards on the torture table.

ROSS
www.datastronghold.com
read more "The Geforce 9600GT 512 Mb Reviewed"

Disable Windows WGA Validation check

Disable Windows WGA Validation check

This describes how to disable the Windows Genuine Advantage Validation Check using Java script.
When you go to the Windows/Microsoft Update site, before you click Express or Custom, type the following into your address bar:

Java script:void(window.g_sDisableWGACheck='all')

and press enter. This disables the WGA check, and allows you to download updates without checking authenticity of your Windows copy.
read more "Disable Windows WGA Validation check"

Remote Administrator Control

Remote Administrator Control 3.3.1

Features:
- Safe and fast computer control through Internet/Intranet network with TCP/IP protocol
- Computer administration and maintenance, e.g. on administrator or management workplaces
- User support and problem solution, e.g. helpdesk workplaces
- Observing teaching in computer classes
- File and folder transfer
- Activity recording when controlling a computer
- Activity monitoring or recording on a remote computer
- Starting commands and tools on a remote system
- Access to home computer from work through HTTP tunnel
- Access to work computer from home or another private network through HTTP tunnel

Image Hosted by ImageShack.us

Supported Operating Systems:
- Windows® 95
- Windows® 98
- Windows® ME
- Windows NT® 4.0
- Windows® 2000
- Windows® XP (32/64-bit)
- Windows® Server 2003 (32/64-bit)
- Windows Vista™ (32/64-bit)

DOWNLOAD
read more "Remote Administrator Control"

Sending Mail with Telnet

Sending Mail with Telnet - send anonymous mail part 2

1) Open up MS-DOS/Command Prompt, by going to Run and typing cmd.

2) You should see a black window box. type in "nslookup".

3) At the very end of the message, there will be a ">". Type in "set type=mx"

4) Now another ">" will come up. Type in the name of the mail domain
of your victim. (hotmail.com, gmail.com, yahoo.com, etc.)

5) you should come up with a list of nameservers, MX servers, and
internet addresses. What we are interested in are the MX preferences.
Take note of the one with the highest MX preference. Now, type "exit".

6)Once you quit, type in this format: telnet [mail server] 25, where
telnet is the command, the mail server is the one with the highest MX
preference, and 25 is the port number.

Ex) telnet gsmtp183.google.com 25, where gsmtp183.google.com is a mail server for gmail.com.

7) If all is well, you should get a 220, meaning a greeting on a
connection. To make sure you are connected, type in "ehlo" or "helo".
If you get a 250 on either one, you're set.

8) now, type in "mail from:" and the email you will send "from".

Ex) mail from:

9) You should get a 250. Type in rcpt to: and the victim's email.

Ex) rcpt to:

10) Once you get a 250, you should now start the data. Type in data, and press enter. You should get a 354

11) First off, you have to start with the headers. Type "To: [Victim's
email nickname] [victims email]", without quotes. Press enter. Type
"From: [your fake name] [your spoofed email address]", without the
quotes. Press enter. Type in "Reply- To: [your spoofed email address]"
without quotes. This is the most basic type.

12) To start writing your message, press enter twice to skip a line.
Type whatever message you want, and BECAREFUL NOT TO SCREW UP. Your
message will screw up if you backspace.

13) To show that your message has ended, press enter, type "." (without
quotes) and press enter again. You should get a 250. Close your
connection by typing "quit" without quotes, and pressing enter.


Original Post By InVinZoR

read more "Sending Mail with Telnet"

Monday, May 26, 2008

PLAYSTATION 2 EMULATORS

PLAYSTATION 2 EMULATORS

PS2 emulators is the most popular category of our website and since PS2 is made, these emulators also got born and PCSX2 is the only most popular emulator which runs most of the games.

First I should let you introduce about Sony PS2

Click to view more...

  • CPU: Emotion Engine 300MHz, 128-bit
    INT, 128-bit FP, 24KB L1, 16KB Scratch,
    8KB VU0, 32KB VU1, 450 MIPS, 6.2 GFLOPS,
    66M Vertices/Sec, 2.4 GB/s Internal,
    1.2 GB/s Graphics, 3.2 GB/s Memory
  • Graphics: Sony GS 150MHz,
    1.2G Texels/Sec, 32-bit Color,
    4MB (48 GB/s), 1.2 GB/sec Bus
  • Sound: SPU2, 48 2D Voices, ADPCM, 2MB
  • Data: 24MB (2.6 GB/s), 16MB (81 MB/s),
    4.7GB Discs, Expansion 56K Modem Ethernet

PS2 Emulators List :

Here is a list of two most successful PS2 Emulators available for download at no cost and please don't expect them that they will run your all PS2 CD's as you know exceptions always exists and also these are in developing stages and later or sooner you would find them better then before.

NeutrinoSX2
PCSX2
read more "PLAYSTATION 2 EMULATORS"

Saturday, May 24, 2008

Sending Mail with Telnet

Sending Mail with Telnet - send anonymous mail part 1

Open the cmd prompt.

Type telnet server.com 25 (If you live in Canada, put 23) (where "server.com" is the name of the smtp (outgoing)

server of your email provider, such as smtp-server.austin.rr.com). This can be found by checking your account info in the program you normally use for email.

Type HELO server.com.

Type MAIL FROM [email protected].

Type RCPT TO [email protected], [email protected], [email protected], etc.
To write the message, type DATA, followed by your message.

To end the message, put a period on a line by itself and press Enter.

Important Tips

Just a note: you may have to enter a ":" after the "mail from:" and the "rcpt to:"

This can also be used to send email as other people.

Some servers also accept 'ELHO' in place of 'HELO'

Warnings for users

Hotmail and some other mail services do not allow telnet access to their mail servers.

This can be tracked by anyone with enough technical skill, access to your ISP's records, and a bit of determination, so don't do anything you wouldn't want to possibly be associated with you.

How to Check Email With Telnet

Telnet can be used as another way to check email. The first two steps are for Windows only; Mac and Linux users should use their own methods for launching a terminal/console window.

Follow these Steps

Select Start in the bottom left corner of the screen, then select Run.

Once the Run window starts, type in cmd.

At the command prompt, type in telnet emailprovider.com 110 (where "emailprovider" is the name of the service you use for email).

Type USER yourusername (you may see what you type or not, and "yourusername" should be changed to whatever comes before the @ in your email address).

Then type in PASS yourpassword (if you can see what you type, you will see your password).

Type list.

You will see a list of items with labels like "1 1024" and "2 123556."

If you want to look at the message labeled 2 123556, type retr 2. You can replace the 2 with any other number to view other messages.

If you want to delete message 1 1024, type dele 1.

When you are done checking your email, type quit.
read more "Sending Mail with Telnet"

Friday, May 23, 2008

NERO 8 ULTRA WITH PERMANENT ACTIVATION AND VISTA READY



NERO 8 ULTRA | PERMANENT ACTIVATION \ VISTA READY

Supported Platforms: Windows XP / 2000 / Vista (including 64bit)

Nero 8
The Ultimate solution for Data, Video, Photo, Audio and BackUp!
Nero 8 is a software solution that brings the digital world to your PC with features that make it fun and easy to create multimedia projects with high-quality, professional results. Create MP3 mixes and edit vacation videos in High Definition format. Share content around the world with simple Internet upload functions. Burn a disc with just one click, and then enjoy it in any room in your house with versatile streaming features. Rest easy knowing your data is safe in the event of a system crash or a damaged disc. Nero 8 lets you live the digital life with cutting-edge technology and world-class features.

Nero 8 comes loaded with a number of features that enhance Windows VistaTM. With the Nero DiscCopy Gadget, you can copy a disc of any format with just one click. With Rich Preview, you can view the contents of your files without having to open a separate application. With Nero MCE Plug-ins, you can burn and stream your content on a Windows Vista™ MCE powered machine.

New and Improved Features in Nero 8:
* Direct access to all features from the project launcher
* High Definition format support
* Xbox 360™ and PlayStation® 3 streaming features
* Blu-ray Disc and HD DVD burning support
* SecurDisc data protection support
* Copy a disc with just one click
* Graphics optimized for Windows Vista™
* Continual free updates

Nero StartSmart makes creating projects fun and simple
Nero StartSmart, the project launcher for Nero 8, lets you directly access features and perform one-click functions. The intuitive interface makes creating and managing digital projects easy and enjoyable. Optimized for use with Windows Vista™, Nero StartSmart even has an integrated newsfeed system.

Nero 8 is the solution for your multimedia projects
Nero 8 has the tools to help you handle all your multimedia projects. Whether you plan to create a music mix with MP3 files, edit vacation videos, touch up digital photos, make a slide show, or convert content to play on a mobile device, your results will be professional and dynamic.

Nero 8 takes home entertainment around the house
Organize and manage all your multimedia files with Nero’s home media center. Nero 8 lets you use your Xbox 360™ or PlayStation® 3 to stream High Definition video content and surround sound audio files to enjoy in the comfort of any room in your house.

Nero 8 offers increased data security
No more worries over losing data! Nero 8 has back up features that let you rest easy knowing your data is safe in case of a complete system crash or a damaged disc. Recover your data quickly and easily and create discs that are password protected. SecurDisc technology gives you peace of mind.

The following applications are included in Nero 8: • Nero Mobile – Media Center for Mobile Devices (Included in the Retail version of Nero 8 only)
• Nero Home 3 – Media Management System
• Nero Scout – Database Technology
• Nero StartSmart 8 – One-Click Project Launcher
• Nero Burning ROM 8 – Expert CD and DVD Burning
• Nero Express 8 – Easy Interface CD and DVD Burning
• Nero WaveEditor 4 – Audio Editing and Recording
• Nero SoundTrax 3 – Professional Audio Mixing
• Nero Vision 5 – Video Editing and Authoring
• Nero Recode 2 – The World’s Fastest Video Converter
• Nero ShowTime 4 – DVD and Multimedia Player
• Nero MediaHome 3 – UPnPTM Streaming Solution
• Nero ControlCenter – Simplified Customization and Configuration
• Nero PhotoSnap – Photo Editing
• Nero PhotoSnap Viewer – Photo Viewing
• Nero CoverDesigner 3 – CD and DVD Label Design
• Nero BackItUp 3 – Complete Backup Solution
• Nero ImageDrive 3 – Virtual Drive Setup
• Nero DiscSpeed 4 – Improve Optical Drive Performance
• Nero DriveSpeed 3 – Complete Optical Drive Control
• Nero RescueAgent – Improved File Recovery
• Nero BurnRights – Easily Deployable Burning Rights
• Nero InfoTool 5 – Drive and Disc Analysis
• InCD 5 – Packet Writing Solution
• SecurDisc Viewer – View SecurDisc protected files

Download
DIRECT LINK FOR NERO
DIRECT LINK FOR NERO (FTP)
PERMANENT ACTIVATION

THANKS TO CHOBSY
read more "NERO 8 ULTRA WITH PERMANENT ACTIVATION AND VISTA READY"

Thursday, May 22, 2008

Save CPU and RAM: Disable the Indexing Service on Windows XP

Save CPU and RAM: Disable the Indexing Service on Windows XP

If there is one bloated and unnecessary service that you should immediately disable, it's definitely the Indexing Service built into Windows XP. The idea behind it is that you can search for files more quickly if it is enabled…. but you are using Google Desktop for that, right?

The indexing service seems to eat up a lot of CPU on every machine I've used, especially when you have the amount of files that I've got. Let's disable it.

  1. Navigate to the Services console via Administrative Tools.
  2. Double-click on the Indexing Service and change the startup type to disabled.
  3. Hit the stop button if it is started, which is likely, and then hit OK.

Yet another unnecessary service stopped!

read more "Save CPU and RAM: Disable the Indexing Service on Windows XP"

Speed Up or Disable Windows Search Indexing in Vista

Speed Up or Disable Windows Search Indexing in Vista

The new indexing service built into Windows Vista has been the subject of a lot of complaints, since it seems to kick in at strange times and thrash your hard drive. So what can we do to speed this up?

There's two options: You can either trim down the amount of files that Windows Search is indexing, or you can disable it entirely if you never use the search.

Trim Down Indexing Locations

The best way to trim down the amount of processor time the indexing service uses is by trimming down the amount of files being indexed. For instance, if you don't regularly search through your C: drive, there's really no need to be indexing it.

Personally, I love the search function for Outlook and the Start Menu, but that's the only places I care about indexing.

Type Indexing into the control panel search or the start menu search box, and you should see an item called Indexing Options.

image

Here you can see the current list of locations that are being indexed. For instance, I only index the start menu and Outlook. If you want to modify or remove locations, use the Modify button.

image

All you have to do to remove a location from being indexed is uncheck the box. You might have to click the Show All Locations button to see some of the default locations.

image

If you wanted to remove the start menu indexing, you'll need to click on Start Menu in the summary list at the bottom, and it'll automatically navigate to the item in the tree.

image

The start menu indexing really doesn't take much processing time though, so I wouldn't bother removing that.

Completely Disable Indexing

If you'd prefer to completely disable the indexing service, you can disable it entirely by turning off the service.

Open up Services through control panel, or by typing services.msc into the start menu search box. Find "Windows Search" in the list of services and double-click on it to open it.

image

Change the Startup type of the service to Disabled, and then click the Stop button to stop the service.

image

At this point the Windows Search service is completely disabled.



Thanks To THE GEEK

read more "Speed Up or Disable Windows Search Indexing in Vista"

Wednesday, May 21, 2008

Add "Run as Administrator" to Any File Type in Windows Vista

Add "Run as Administrator" to Any File Type in Windows Vista

Have you ever tried to unzip a file to the Program Files directory in Vista? You'll get all sorts of permission denied errors, and generally be unsuccessful. So how do we open up the zipfile as an administrator? For that matter, how do you open any file as administrator?

There's a simple registry tweak that will let us specify the action to run as administrator for a file type. Unfortunately you'll have to make the tweak manually, but we'll walk you through it.

Manual Registry Tweak

Open regedit through the start menu search or run box and then browse down to the following key, substituting ".zip" for the file extension that you are looking for. (Note that the find dialog helps here)

HKEY_CLASSES_ROOT\.zip

image

Now you want to take note of the Data value for the "(Default)" item. This tells you which application is registered to handle this file type, and also where we need to go in the registry next.

For this example, since the data field in this example says "WinRAR.ZIP" we'll need to browse down to the following registry key. (again, the find dialog helps here)

HKEY_CLASSES_ROOT\WinRAR.ZIP\shell\open\command

What we want to do is copy the shell\open\command section to shell\runas\command. The easiest way to do that is right-click on "command" and then choose Export.

image

Now open up the exported registry file in Notepad and change "open" to "runas" where indicated below:

image

Double-click on the file to enter the information into the registry. Now you'll see that the "runas" section is identical to the "open" section:

image

And now you can right-click on a file and open it as administrator:

image

This example used WinRAR, but this should work for almost any filetype or application. You'll just have to change where you look in the registry.

read more "Add "Run as Administrator" to Any File Type in Windows Vista"

Enable Hidden BootScreen in Windows Vista

Enable Hidden BootScreen in Windows Vista

The Windows Vista BootScreen is pointless, but Microsoft decided to hide a more visually appealing boot screen that can easily be enabled with very little trouble. I'm not sure why they didn't make the boot screen better.

Here's the default boot screen:

And here's the hidden one, called "Aurora"

All you have to do is type msconfig into the start menu search box, and hit enter.

Click the Boot tab, and then check the "No GUI boot" checkbox.

Hit OK and reboot the computer. You should see the new boot screen immediately.

Note: You may get a Windows Defender error on the next startup. You can enable the system config utility using the tray icon and this error will go away.

read more "Enable Hidden BootScreen in Windows Vista"

Add "My Computer" to Your Vista Taskbar

Add "My Computer" to Your Vista Taskbar

I like to have the quickest access possible to folders on my desktop, which usually means putting something onto the taskbar if possible. You can add the Computer menu as a folder on the taskbar for the easiest access to your drives. You could also use this tip for any folder you want.

To add a folder to the taskbar, just right-click on the taskbar and choose the Toolbars menu, and then click on New Toolbar.

image

Just find the folder that you want… in this instance we'll select the Computer icon and then click on Select Folder.

image

Now you can see the Computer folder right there on the taskbar. If you click the little arrows it will pop up and let you browse through all your drives.

image

I always add the Desktop to the toolbar as well.

read more "Add "My Computer" to Your Vista Taskbar"

10 Reasons Why Pcs Crash

10 Reasons Why Pcs Crash

Fatal error: the system has become unstable or is busy," it says. "Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications."


You have just been struck by the Blue Screen of Death. Anyone who uses Mcft Windows will be familiar with this. What can you do? More importantly, how can you prevent it happening?

1) Hardware conflict

The number one reason why Windows crashes is hardware conflict. Each hardware device communicates to other devices through an interrupt request channel (IRQ). These are supposed to be unique for each device.

For example, a printer usually connects internally on IRQ 7. The keyboard usually uses IRQ 1 and the floppy disk drive IRQ 6. Each device will try to hog a single IRQ for itself.

If there are a lot of devices, or if they are not installed properly, two of them may end up sharing the same IRQ number. When the user tries to use both devices at the same time, a crash can happen. The way to check if your computer has a hardware conflict is through the following route:

* Start-Settings-Control Panel-System-Device Manager.

Often if a device has a problem a yellow '!' appears next to its description in the Device Manager. Highlight Computer (in the Device Manager) and press Properties to see the IRQ numbers used by your computer. If the IRQ number appears twice, two devices may be using it.

Sometimes a device might share an IRQ with something described as 'IRQ holder for PCI steering'. This can be ignored. The best way to fix this problem is to remove the problem device and reinstall it.

Sometimes you may have to find more recent drivers on the internet to make the device function properly. A good resource is www.driverguide.com. If the device is a soundcard, or a modem, it can often be fixed by moving it to a different slot on the motherboard (be careful about opening your computer, as you may void the warranty).

When working inside a computer you should switch it off, unplug the mains lead and touch an unpainted metal surface to discharge any static electricity.

To be fair to Mcft, the problem with IRQ numbers is not of its making. It is a legacy problem going back to the first PC designs using the IBM 8086 chip. Initially there were only eight IRQs. Today there are 16 IRQs in a PC. It is easy to run out of them. There are plans to increase the number of IRQs in future designs.

2) Bad Ram

Ram (random-access memory) problems might bring on the blue screen of death with a message saying Fatal Exception Error. A fatal error indicates a serious hardware problem. Sometimes it may mean a part is damaged and will need replacing.

But a fatal error caused by Ram might be caused by a mismatch of chips. For example, mixing 70-nanosecond (70ns) Ram with 60ns Ram will usually force the computer to run all the Ram at the slower speed. This will often crash the machine if the Ram is overworked.

One way around this problem is to enter the BIOS settings and increase the wait state of the Ram. This can make it more stable. Another way to troubleshoot a suspected Ram problem is to rearrange the Ram chips on the motherboard, or take some of them out. Then try to repeat the circumstances that caused the crash. When handling Ram try not to touch the gold connections, as they can be easily damaged.

Parity error messages also refer to Ram. Modern Ram chips are either parity (ECC) or non parity (non-ECC). It is best not to mix the two types, as this can be a cause of trouble.

EMM386 error messages refer to memory problems but may not be connected to bad Ram. This may be due to free memory problems often linked to old Dos-based programmes.

3 )BIOS settings

Every motherboard is supplied with a range of chipset settings that are decided in the factory. A common way to access these settings is to press the F2 or delete button during the first few seconds of a boot-up.

Once inside the BIOS, great care should be taken. It is a good idea to write down on a piece of paper all the settings that appear on the screen. That way, if you change something and the computer becomes more unstable, you will know what settings to revert to.

A common BIOS error concerns the CAS latency. This refers to the Ram. Older EDO (extended data out) Ram has a CAS latency of 3. Newer SDRam has a CAS latency of 2. Setting the wrong figure can cause the Ram to lock up and freeze the computer's display.

Mcft Windows is better at allocating IRQ numbers than any BIOS. If possible set the IRQ numbers to Auto in the BIOS. This will allow Windows to allocate the IRQ numbers (make sure the BIOS setting for Plug and Play OS is switched to 'yes' to allow Windows to do this.).

4 )Hard disk drives

After a few weeks, the information on a hard disk drive starts to become piecemeal or fragmented. It is a good idea to defragment the hard disk every week or so, to prevent the disk from causing a screen freeze. Go to

* Start-Programs-Accessories-System Tools-Disk Defragmenter

This will start the procedure. You will be unable to write data to the hard drive (to save it) while the disk is defragmenting, so it is a good idea to schedule the procedure for a period of inactivity using the Task Scheduler.

The Task Scheduler should be one of the small icons on the bottom right of the Windows opening page (the desktop).

Some lockups and screen freezes caused by hard disk problems can be solved by reducing the read-ahead optimisation. This can be adjusted by going to

* Start-Settings-Control Panel-System Icon-Performance-File System-Hard Disk.

Hard disks will slow down and crash if they are too full. Do some housekeeping on your hard drive every few months and free some space on it. Open the Windows folder on the C drive and find the Temporary Internet Files folder. Deleting the contents (not the folder) can free a lot of space.

Empty the Recycle Bin every week to free more space. Hard disk drives should be scanned every week for errors or bad sectors. Go to

* Start-Programs-Accessories-System Tools-ScanDisk

Otherwise assign the Task Scheduler to perform this operation at night when the computer is not in use.

5) Fatal OE exceptions and VXD errors

Fatal OE exception errors and VXD errors are often caused by video card problems.

These can often be resolved easily by reducing the resolution of the video display. Go to

* Start-Settings-Control Panel-Display-Settings

Here you should slide the screen area bar to the left. Take a look at the colour settings on the left of that window. For most desktops, high colour 16-bit depth is adequate.

If the screen freezes or you experience system lockups it might be due to the video card. Make sure it does not have a hardware conflict. Go to

* Start-Settings-Control Panel-System-Device Manager

Here, select the + beside Display Adapter. A line of text describing your video card should appear. Select it (make it blue) and press properties. Then select Resources and select each line in the window. Look for a message that says No Conflicts.

If you have video card hardware conflict, you will see it here. Be careful at this point and make a note of everything you do in case you make things worse.

The way to resolve a hardware conflict is to uncheck the Use Automatic Settings box and hit the Change Settings button. You are searching for a setting that will display a No Conflicts message.

Another useful way to resolve video problems is to go to

* Start-Settings-Control Panel-System-Performance-Graphics

Here you should move the Hardware Acceleration slider to the left. As ever, the most common cause of problems relating to graphics cards is old or faulty drivers (a driver is a small piece of software used by a computer to communicate with a device).

Look up your video card's manufacturer on the internet and search for the most recent drivers for it.

6) Viruses

Often the first sign of a virus infection is instability. Some viruses erase the boot sector of a hard drive, making it impossible to start. This is why it is a good idea to create a Windows start-up disk. Go to

* Start-Settings-Control Panel-Add/Remove Programs

Here, look for the Start Up Disk tab. Virus protection requires constant vigilance.

A virus scanner requires a list of virus signatures in order to be able to identify viruses. These signatures are stored in a DAT file. DAT files should be updated weekly from the website of your antivirus software manufacturer.

An excellent antivirus programme is McAfee VirusScan by Network Associates ( www.nai.com). Another is Norton AntiVirus 2000, made by Symantec ( www.symantec.com).

7) Printers

The action of sending a document to print creates a bigger file, often called a postscript file.

Printers have only a small amount of memory, called a buffer. This can be easily overloaded. Printing a document also uses a considerable amount of CPU power. This will also slow down the computer's performance.

If the printer is trying to print unusual characters, these might not be recognised, and can crash the computer. Sometimes printers will not recover from a crash because of confusion in the buffer. A good way to clear the buffer is to unplug the printer for ten seconds. Booting up from a powerless state, also called a cold boot, will restore the printer's default settings and you may be able to carry on.

8) Software

A common cause of computer crash is faulty or badly-installed software. Often the problem can be cured by uninstalling the software and then reinstalling it. Use Norton Uninstall or Uninstall Shield to remove an application from your system properly. This will also remove references to the programme in the System Registry and leaves the way clear for a completely fresh copy.

The System Registry can be corrupted by old references to obsolete software that you thought was uninstalled. Use Reg Cleaner by Jouni Vuorio to clean up the System Registry and remove obsolete entries. It works on Windows 95, Windows 98, Windows 98 SE (Second Edition), Windows Millennium Edition (ME), NT4 and Windows 2000.

Read the instructions and use it carefully so you don't do permanent damage to the Registry. If the Registry is damaged you will have to reinstall your operating system. Reg Cleaner can be obtained from www.jv16.org

Often a Windows problem can be resolved by entering Safe Mode. This can be done during start-up. When you see the message "Starting Windows" press F4. This should take you into Safe Mode.

Safe Mode loads a minimum of drivers. It allows you to find and fix problems that prevent Windows from loading properly.

Sometimes installing Windows is difficult because of unsuitable BIOS settings. If you keep getting SUWIN error messages (Windows setup) during the Windows installation, then try entering the BIOS and disabling the CPU internal cache. Try to disable the Level 2 (L2) cache if that doesn't work.

Remember to restore all the BIOS settings back to their former settings following installation.

9) Overheating

Central processing units (CPUs) are usually equipped with fans to keep them cool. If the fan fails or if the CPU gets old it may start to overheat and generate a particular kind of error called a kernel error. This is a common problem in chips that have been overclocked to operate at higher speeds than they are supposed to.

One remedy is to get a bigger better fan and install it on top of the CPU. Specialist cooling fans/heatsinks are available from www.computernerd.com or www.coolit.com

CPU problems can often be fixed by disabling the CPU internal cache in the BIOS. This will make the machine run more slowly, but it should also be more stable.

10) Power supply problems

With all the new construction going on around the country the steady supply of electricity has become disrupted. A power surge or spike can crash a computer as easily as a power cut.

If this has become a nuisance for you then consider buying a uninterrupted power supply (UPS). This will give you a clean power supply when there is electricity, and it will give you a few minutes to perform a controlled shutdown in case of a power cut.

It is a good investment if your data are critical, because a power cut will cause any unsaved data to be lost.


Thanks to Zain92
read more "10 Reasons Why Pcs Crash"

Enabiling Cmd + Regedit When It's Disabled By Admin / Group Policy

Enabiling Cmd + Regedit When It's Disabled By Admin / Group Policy

CMD:

Step 1:
Create a new shortcut
Step 2:
Add the following to the shortcut:

REG add HKCU\Software\Policies\Microsoft\Windows\System /v DisableCMD /t REG_DWORD /d 0 /f


Regedit:

Step 1:
Create shortcut
Step 2:
Add the following to the shortcut:

REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_DWORD /d 0 /f
Back register keys b4 u try this

Thanks to Zain92
read more "Enabiling Cmd + Regedit When It's Disabled By Admin / Group Policy"

Tuesday, May 20, 2008

Adobe Photoshop CS3




Adobe Flash, previously called Shockwave Flash and Macromedia Flash, is a set of multimedia technologies developed and distributed first by Adobe Systems and earlier by Macromedia. Since its introduction in 1996, Flash technology has become a popular method for adding animation and interactivity to web pages; Flash is commonly used to create animation, advertisements, various web page components, to integrate video into web pages, and more recently, to develop rich Internet applications.



Flash can manipulate vector and raster graphics and supports bi-directional streaming of audio and video. It contains a scripting language called ActionScript. It is available in most common web browsers and some mobile phones and other electronic devices (using Flash Lite). Several software products, systems, and devices are able to create or display Flash, including the Adobe Flash Player. The Adobe Flash Professional multimedia authoring program used to create content for the Adobe Engagement Platform, such as web applications, games and movies, and content for mobile phones and other embedded devices.

Download:

read more "Adobe Photoshop CS3"

Brother in Arms Earned in Blood

Download Brother in Arms Earned in Blood iSO
- 13/05/08
http://rapidshare.com/files/65530747/BiA2.part01.rar
http://rapidshare.com/files/65406704/BiA2.part02.rar
http://rapidshare.com/files/65540692/BiA2.part03.rar
http://rapidshare.com/files/65551037/BiA2.part04.rar
http://rapidshare.com/files/65431591/BiA2.part05.rar
http://rapidshare.com/files/65448137/BiA2.part06.rar
http://rapidshare.com/files/65448486/BiA2.part07.rar
http://rapidshare.com/files/65460533/BiA2.part08.rar
http://rapidshare.com/files/65460810/BiA2.part09.rar
http://rapidshare.com/files/65471042/BiA2.part10.rar
http://rapidshare.com/files/65471074/BiA2.part11.rar
http://rapidshare.com/files/65480684/BiA2.part12.rar
http://rapidshare.com/files/65480541/BiA2.part13.rar
http://rapidshare.com/files/65492105/BiA2.part14.rar
http://rapidshare.com/files/65492533/BiA2.part15.rar
http://rapidshare.com/files/65507400/BiA2.part16.rar
http://rapidshare.com/files/65508610/BiA2.part17.rar
http://rapidshare.com/files/65737631/BiA2.part18.rar
http://rapidshare.com/files/65521885/BiA2.part19.rar
http://rapidshare.com/files/65571566/BiA2.part20.rar
http://rapidshare.com/files/65560657/BiA2.part21.rar
http://rapidshare.com/files/65581522/BiA2.part22.rar
http://rapidshare.com/files/65598308/BiA2.part23.rar
http://rapidshare.com/files/65607960/BiA2.part24.rar
http://rapidshare.com/files/65617222/BiA2.part25.rar
http://rapidshare.com/files/65626836/BiA2.part26.rar
http://rapidshare.com/files/65636194/BiA2.part27.rar
http://rapidshare.com/files/65644936/BiA2.part28.rar
http://rapidshare.com/files/65653701/BiA2.part29.rar
http://rapidshare.com/files/65661639/BiA2.part30.rar
http://rapidshare.com/files/65668963/BiA2.part31.rar
http://rapidshare.com/files/65675617/BiA2.part32.rar
http://rapidshare.com/files/65681415/BiA2.part33.rar
http://rapidshare.com/files/65687149/BiA2.part34.rar
http://rapidshare.com/files/65692490/BiA2.part35.rar
http://rapidshare.com/files/65697198/BiA2.part36.rar
http://rapidshare.com/files/65702023/BiA2.part37.rar
http://rapidshare.com/files/65707131/BiA2.part38.rar
http://rapidshare.com/files/65713086/BiA2.part39.rar
http://rapidshare.com/files/65725425/BiA2.part40.rar
http://rapidshare.com/files/65752324/BiA2.part41.rar
http://rapidshare.com/files/65763220/BiA2.part42.rar
http://rapidshare.com/files/65773342/BiA2.part43.rar
http://rapidshare.com/files/65784027/BiA2.part44.rar
http://rapidshare.com/files/65796154/BiA2.part45.rar
read more "Brother in Arms Earned in Blood"

Website links for tutorials

Though I would create a list of websites for beginners to learn from or pros to learn a new trick or 2.

http://www.good-tutorials.com/tutorials/photoshop/
http://www.tutorialized.com/tutorials/Photoshop/1
http://photoshoptutorials.ws/
www.photoshopstar.com
www.photoshopcafe.com/tutorials.htm
www.absolutecross.com/tutorials/photoshop/
www.grafx-design.com/phototut.html
http://www.smashingmagazine.com/2007/01/12/hand-picked-photoshop-tutorials/
www.photoshoproadmap.com/Photoshop-tutorials
www.pstut.com/
www.photoshop101.com/
www.photoshopnewbies.com/
www.photoshopsupport.com/tutorials.html
www.fstutorials.com/
www.easytutorials.org/photoshop_tutorials.html
www.deviantart.com (search for tutorials)
read more "Website links for tutorials"

Hide Ur IP - sockcaps tutorial

Hide Ur IP

SocksCap is an application wrapper developed by NEC. SocksCap enables the Internet applications to run through a socks server so that the server end of the application can't know your real IP address. SocksCap does not require modifications to the Winsock applications or the Winsock stacks. On a SOCKS enabled firewall SocksCap offers a client-only solution. Socks is now owned by Permeo.


SocksCap allows Windows users to enable their Winsock applications to traverse a SOCKS server. SocksCap does not require modifications to the Winsock applications or the Winsock stacks. However, due to the multitude of available Winsock stacks, SocksCap may not work in every situation.

Other Program that Support SOCKS
Each program that support SOCKS proxy should have a section in their configuration for Proxy Setup. In this section the following information will be asked for:

1. SOCKS Server:
Fill in the socks server address such as "sock5.my-proxy.com" or 128.58.14.99

2. Port:
Usually 1080. (port 1080 is the default port for socks server)

3. User Name:
Fill in it if the server need.

4. Password:
Fill in it if the server need.

Sockscap Makes Using Socks Easy

If the Internet program that you are using does not have a proxy setup option, or if you want to make configuring easier, then you can use a freeware application such as SocksCap.

Once sockscap is configured for our proxy server, you do not need to configure any of your Internet programs. Simply click and drag your Internet programs into the sockscap program control window, start the program, and you are runing on the proxy! It is this easy.

Downloading Sockscap Of Oficial Website:

Send SocksCap comments and bug reports to:


Permeo Application Security Platform:

http://www.permeo.com/


Socks WWW site:

http://www.socks.permeo.com/



After Downloading SocksCap you can configure your settings as shown in the following screen captures.



Sockscap Fast / EASY Setup

Select 'File' from the Top left of the SocksCap interface, then select 'Setup' from the drop down menu. Enter the socks server address and port you have.

Under the 'Protocol' section, you should enter your user name when using a SOCK4 server. If you use a Sock5 server, commonly you can select "Resolve all names removely" under the 'Name Resolution' section. Ask help from the Sock5 server master if you have a problem here.

Under "Supported authentication" check the box for "Username/ Password" if you have. A Sock5 proxy server usuall need one.

From the main SocksCap control window, add your applications the same way you would create a Windows shortcut as in the following screen captures. You can drag and drop your favourite applications from your desktop or program directory into the SocksCap control window for easy "socksification".

Click and drag your program icon into the blank control window and you will see...



Click on New application profile and you will see..


Simply click on the Ok button and your program will be added to the sockscap control window. Repeat this step for each of your Internet programs that you would like to use on the LockDown Proxy. When you are finished your sockscap control window will look something like the example below.


Now you are ready to use sockscap to launch your programs.

1. Close or Exit Sockscap.
2. Close or Exit your Internet Programs.
3. Make sure that you are connected to the Internet.
4. Launch sockscap and enter the user name and password for the sock5 proxy server you set.
5. Launch your Internet programs from the sockscap control window.

When you setup your new applications to run "socksified" you no longer need to use the proxy settings in the application itself, simply start them through the SocksCap interface and they will be working under our proxy service and hide your real connection.

Testing Your Connection

You can test your browser by loading the

http://info.my-proxy.com

web page from IE in the SockCap control. If you are connecting through the proxy, you will see what your real IP address is hided.

*NOTE* You can drag and drop your newly created "socksified" clients from the main SocksCap control window, to your desktop so you don't have to re-open the SocksCap control window to start your sessions.

Now you are ready. Any time you like you can start your SocksCap program and launch your Internet programs "socksified" under The Proxy Connection Proxy Servers.



read more "Hide Ur IP - sockcaps tutorial"