Sunday, December 30, 2012

Where are you?


As you may be aware, a Linux filesystem is in the form of a large tree with many branches called "subdirectories". When you issue a shell command, it is often necessary to know where you are in the "tree". Type this example:

$ pwd
/path/path/path

When you try this example ("pwd" means "print working directory"), your current working directory will be printed.

You can decide where you are in the tree. Type this example:

$ cd ~
$ pwd

/home/username

The symbol "~" is a special shortcut character that can be used to refer to your home directory. You could have typed this —

$ cd /home/username

— and accomplished the same result, but if you think about it, the "~" character is more portable. Later, when you are writing shell scripts, you might want a command that moves to any user's home directory.

Sunday, December 9, 2012

Simple Stuff


First, a convention. I'll list things for you to type in this format:

# date 

I will list the computer's reply like this:

Tue Dec 23 10:52:51 PST 2003

Notice the "$" symbol in the user entry above. This is a generic shell prompt, and yours will almost certainly look different (but it will include a similar symbol). I'll be using one of two prompts (this is a common convention, worth remembering): I'll use "$" to refer to a normal user session, and "#" to refer to a root session.
NOTE: Avoid using root sessions and permissions unless it is required. Misused root authority can cause very serious harm to your system. Since this is a tutorial in which you will want to experiment with different commands, limit the chance for harm by doing so as an ordinary user.

To put this another way, enter this example:

# whoami
root

If your session produced the result shown above, please — log out and become an ordinary user.

In shell programming, spaces matter. If you see spaces between words and characters in these examples, be sure to include the spaces.

In shell programming, case matters also. If you don't get the results shown on this page, look at the case of your entries.

Thursday, December 6, 2012

Solve USB Drives Data Not Showing



Sometimes users face problem when their USB drives data does not show, while checking property of drive it shows complete space occupied. Actually it happens because of virus, which changes data attribute to system files and hidden so we can't see data easily. Well it's not dangerous at all, so should not worry about data as we can easily recover it. Follow these steps for recovering your data with folder options and command prompt:

Open Folder Options by entering "control folders" in run.

Go to view tab.

Check "Show hidden files, folders, and drives" under Hidden files and folder .

Uncheck "Hide protected operating system files (Recommended)"

Click Apply & then OK.

Open your USB drive, you can see your all files here.

Now convert these all files back to original form, for converting:

Open command prompt, go to the USB drive path (suppose "I") using command > I:

Copy your affected file/folder name (suppose folder My Music).

Type command as attrib -h -s "My Music", it will change your folder attrib back to normal.

For converting any file, you must mention the extension with file name (like attrib -h -s setup.exe).

Monday, December 3, 2012

Keyboard Shortcut



Windows Shortcuts


General Keyboard Shortcuts
• CTRL+C (Copy)
• CTRL+X (Cut)
• CTRL+V (Paste)
• CTRL+Z (Undo)
• DELETE (Delete)
• SHIFT+DELETE (Delete the selected item permanently without placing the item in the Recycle Bin)
• CTRL while dragging an item (Copy the selected item)
• CTRL+SHIFT while dragging an item (Create a shortcut to the selected item)
• F2 key (Rename the selected item)
• CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next word)
• CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous word)
• CTRL+DOWN ARROW (Move the insertion point to the beginning of the next paragraph)
• CTRL+UP ARROW (Move the insertion point to the beginning of the previous paragraph)
• CTRL+SHIFT with any of the arrow keys (Highlight a block of text)
• SHIFT with any of the arrow keys (Select more than one item in a window or on the desktop, or select text in a document)
• CTRL+A (Select all)
• F3 key (Search for a file or a folder)
• ALT+ENTER (View the properties for the selected item)
• ALT+F4 (Close the active item, or quit the active program)
• ALT+ENTER (Display the properties of the selected object)
• ALT+SPACEBAR (Open the shortcut menu for the active window)
• CTRL+F4 (Close the active document in programs that enable you to have multiple documents open simultaneously)
• ALT+TAB (Switch between the open items)
• ALT+ESC (Cycle through items in the order that they had been opened)
• F6 key (Cycle through the screen elements in a window or on the desktop)
• F4 key (Display the Address bar list in My Computer or Windows Explorer)
• SHIFT+F10 (Display the shortcut menu for the selected item)
• ALT+SPACEBAR (Display the System menu for the active window)
• CTRL+ESC (Display the Start menu)
• ALT+Underlined letter in a menu name (Display the corresponding menu)
• Underlined letter in a command name on an open menu (Perform the corresponding command)
• F10 key (Activate the menu bar in the active program)
• RIGHT ARROW (Open the next menu to the right, or open a submenu)
• LEFT ARROW (Open the next menu to the left, or close a submenu)
• F5 key (Update the active window)
• BACKSPACE (View the folder one level up in My Computer or Windows Explorer)
• ESC (Cancel the current task)
• SHIFT when you insert a CD-ROM into the CD-ROM drive (Prevent the CD-ROM from automatically playing)

Dialog Box Keyboard Shortcuts
• CTRL+TAB (Move forward through the tabs)
• CTRL+SHIFT+TAB (Move backward through the tabs)
• TAB (Move forward through the options)
• SHIFT+TAB (Move backward through the options)
• ALT+Underlined letter (Perform the corresponding command or select the corresponding option)
• ENTER (Perform the command for the active option or button)
• SPACEBAR (Select or clear the check box if the active option is a check box)
• Arrow keys (Select a button if the active option is a group of option buttons)
• F1 key (Display Help)
• F4 key (Display the items in the active list)
• BACKSPACE (Open a folder one level up if a folder is selected in the Save As or Open dialog box)

Microsoft Natural Keyboard Shortcuts
• Windows Logo (Display or hide the Start menu)
• Windows Logo+BREAK (Display the System Properties dialog box)
• Windows Logo+D (Display the desktop)
• Windows Logo+M (Minimize all of the windows)
• Windows Logo+SHIFT+M (Restore the minimized windows)
• Windows Logo+E (Open My Computer)
• Windows Logo+F (Search for a file or a folder)
• CTRL+Windows Logo+F (Search for computers)
• Windows Logo+F1 (Display Windows Help)
• Windows Logo+ L (Lock the keyboard)
• Windows Logo+R (Open the Run dialog box)
• Windows Logo+U (Open Utility Manager)

Accessibility Keyboard Shortcuts
• Right SHIFT for eight seconds (Switch FilterKeys either on or off)
• Left ALT+left SHIFT+PRINT SCREEN (Switch High Contrast either on or off)
• Left ALT+left SHIFT+NUM LOCK (Switch the MouseKeys either on or off)
• SHIFT five times (Switch the StickyKeys either on or off)
• NUM LOCK for five seconds (Switch the ToggleKeys either on or off)
• Windows Logo +U (Open Utility Manager)

Windows Explorer Keyboard Shortcuts
• END (Display the bottom of the active window)
• HOME (Display the top of the active window)
• NUM LOCK+Asterisk sign (*) (Display all of the subfolders that are under the selected folder)
• NUM LOCK+Plus sign (+) (Display the contents of the selected folder)
• NUM LOCK+Minus sign (-) (Collapse the selected folder)
• LEFT ARROW (Collapse the current selection if it is expanded, or select the parent folder)
• RIGHT ARROW (Display the current selection if it is collapsed, or select the first subfolder)

Shortcut Keys for Character Map
After you double-click a character on the grid of characters, you can move through the grid by using the keyboard shortcuts: • RIGHT ARROW (Move to the right or to the beginning of the next line)
• LEFT ARROW (Move to the left or to the end of the previous line)
• UP ARROW (Move up one row)
• DOWN ARROW (Move down one row)
• PAGE UP (Move up one screen at a time)
• PAGE DOWN (Move down one screen at a time)
• HOME (Move to the beginning of the line)
• END (Move to the end of the line)
• CTRL+HOME (Move to the first character)
• CTRL+END (Move to the last character)
• SPACEBAR (Switch between Enlarged and Normal mode when a character is selected)

Microsoft Management Console (MMC) Main Window Keyboard Shortcuts
• CTRL+O (Open a saved console)
• CTRL+N (Open a new console)
• CTRL+S (Save the open console)
• CTRL+M (Add or remove a console item)
• CTRL+W (Open a new window)
• F5 key (Update the content of all console windows)
• ALT+SPACEBAR (Display the MMC window menu)
• ALT+F4 (Close the console)
• ALT+A (Display the Action menu)
• ALT+V (Display the View menu)
• ALT+F (Display the File menu)
• ALT+O (Display the Favorites menu)

MMC Console Window Keyboard Shortcuts
• CTRL+P (Print the current page or active pane)
• ALT+Minus sign (-) (Display the window menu for the active console window)
• SHIFT+F10 (Display the Action shortcut menu for the selected item)
• F1 key (Open the Help topic, if any, for the selected item)
• F5 key (Update the content of all console windows)
• CTRL+F10 (Maximize the active console window)
• CTRL+F5 (Restore the active console window)
• ALT+ENTER (Display the Properties dialog box, if any, for the selected item)
• F2 key (Rename the selected item)
• CTRL+F4 (Close the active console window. When a console has only one console window, this shortcut closes the console)

Remote Desktop Connection Navigation
• CTRL+ALT+END (Open the Microsoft Windows NT Security dialog box)
• ALT+PAGE UP (Switch between programs from left to right)
• ALT+PAGE DOWN (Switch between programs from right to left)
• ALT+INSERT (Cycle through the programs in most recently used order)
• ALT+HOME (Display the Start menu)
• CTRL+ALT+BREAK (Switch the client computer between a window and a full screen)
• ALT+DELETE (Display the Windows menu)
• CTRL+ALT+Minus sign (-) (Place a snapshot of the entire client window area on the Terminal server clipboard and provide the same functionality as pressing ALT+PRINT SCREEN on a local computer.)
• CTRL+ALT+Plus sign (+) (Place a snapshot of the active window in the client on the Terminal server clipboard and provide the same functionality as pressing PRINT SCREEN on a local computer.)

Microsoft Internet Explorer Navigation
• CTRL+B (Open the Organize Favorites dialog box)
• CTRL+E (Open the Search bar)
• CTRL+F (Start the Find utility)
• CTRL+H (Open the History bar)
• CTRL+I (Open the Favorites bar)
• CTRL+L (Open the Open dialog box)
• CTRL+N (Start another instance of the browser with the same Web address)
• CTRL+O (Open the Open dialog box, the same as CTRL+L)
• CTRL+P (Open the Print dialog box)
• CTRL+R (Update the current Web page)
• CTRL+W (Close the current window)

Sunday, December 2, 2012

Detect Suspicious Gmail Account Activity


If you are suspicious that someone else might be using your Gmail account, Gmail provides an interface which allows you to cross check and validate the same. This feature allows you to track all the sessions currently active for your gmail account as well as history of all the logins made by you, alongwith the IP address and location  (country / city mapping) alongwith the type of device (Browser/Mobile etc.). This feature also allows you to remotely logout any other active session.

Gmail has now enhanced the feature and also added a warning system into it. Below is an update to the feature
This information is still at the bottom of your inbox. Now, if it looks like something unusual is going on with your account, we’ll also alert you by posting a warning message saying, “Warning: We believe your account was last accessed from…” along with the geographic region that we can best associate with the access.
To determine when to display this message, our automated system matches the relevant IP address, logged per the Gmail privacy policy, to a broad geographical location. While we don’t have the capability to determine the specific location from which an account is accessed, a login appearing to come from one country and occurring a few hours after a login from another country may trigger an alert.
So basically what the new addition to the feature does is, it alerts you if it finds too much variation in the incoming IP address block. This can also happen if you are signing in from a Proxy / VPN located in another country, or signing into your Gmail account from your BlackBerry etc. However, all things constant, if this warning ever appears, it will be in your best interest to change your password.

Friday, November 30, 2012

Block Autorun Malware using Bitdefender free tool

Autorun malware is the most widely found in the computer systems and removal devices. Most of the windows users are affected by this malware. The famous antivirus vendor company BitDefender has launched a free tool to protect windows user from this malware. Dubbed BitDefender USB Immunizer the application doesn't require any installation. It comes as a single executable which provides a simple user interface. It has 2 options for protection one for computer and other for removable media.

There is a drop-down list which allows users to select the device and press an immunize button.
Working of this device is very simple. This tool creates a folder called autorun.inf with read only, hidden and system attributes on the device and each drive of system. It contains a sub-folder and two empty files. The reasoning behind this procedure is to prevent AutoRun malware from creating the rogue autorun.inf files which it requires for propagation.


Download here 

Wednesday, November 28, 2012

Solve Hidden Files & Folders Not Showing

Solve Hidden Files & Folders Not Showing
Go to start>run>cmd>Type regsvr32 /i browseui.dll
Wait for confirmation window.


Now Type regsvr32 /i shell32.dll
Wait for confirmation window. 

Monday, November 26, 2012

The Story About Virus Maker


An email worm maker and his punishment

Computer viruses, worms and Trojans are the programs or codes that run in a computer without the knowledge and permission of the computer user. They are always annoying and are meant to not only disturb the computer user but also to destroy the computer or sometimes the reputation of other famous people and celebrities. A virus is so named because it infects the computer and data and it is most of the times contagious. It can be transmitted to other computers through Local Area Network, usually by file sharing and Wide Area Network, usually by sending emails. However, there are certain ways to block the viruses entering into the computer. For this purpose a number of antivirus programs, softwares and utilities have been designed which are doing the job sometimes partially and sometimes completely.

The important question arises that how computer viruses are formed. Obviously they are not produced automatically; however they have the ability to reproduce themselves. There is always a person or a group of persons working to produce viruses and worms. These persons are known as virus makers. Sometimes there are large organizations working to make viruses, worms and adware. Adware is usually designed to advertise or market products. Therefore organizations create adware in order to increase their sales. Sometimes the only intention of designing virus is to bring troubles in the work of a computer user. Whatever the objective behind making a virus is, the designing and production of virus is always considered as a crime. Since there are many antivirus softwares and tools which are unable to prevent the viruses completely and a lot of viruses are being produced which are aggravating the problem, therefore certain rules and laws have been designed to handle this issue. There is a strict punishment for the person who commits the crime of virus making. These rules and punishments are different in different countries.

Even after the implementation of strict rules, the trend of virus making had been propagating unless some people who were found guilty were imprisoned for committing this crime. It is true that some people were caught and found guilty for making and spreading the viruses. There are a number of stories related to the virus makers. Most of the virus makers are found young. There is a story of a virus maker who is only 21 year old. The details of the story are given below.

In September 2001, a 21 year old man was found guilty for spreading the email worm. The issue was brought to the court in order to decide the punishment for the crime. Although his lawyer was not satisfied with the punishment he had been given, but due to the destruction done by the worm the punishment was really justified. The man used to have some tools to create the worm. The worm was about the email containing the images of a female tennis star. The email was propagated just in two days in February 2001 and the evil objective behind the virus making was easily fulfilled. Later on, it was found that the man used to work in a computer store and he owned more than seven thousand computer viruses.

Although the virus maker explained that he was not aware of the future problems that could have been aroused because of the virus he created and he himself did not completely realize the evilness behind the task but such weak justifications did not affect the decisions of the judges. He had done the crime for which he could be in prison for complete four years with a fine of around forty thousand dollars. However, he requested to offer community service for two hundred and forty hours.

Please note that the nationality of the virus maker and the name and nationality of the tennis sports player are not disclosed in order to follow some ethical rules but the story about the virus maker is described to create awareness among the people. The virus making job is not only unethical but it is also illegal. The individuals and organizations who are involved in the business of virus making often forget the possible outcomes of the crime. It should be taken seriously. It is a humble request to all the virus makers to stop committing this crime.

Sunday, November 25, 2012

How to Disable Command Prompt?



Wanna to do some fun with your CMD, follow these simple steps for disabling your command prompt:


Go to start> run> Type gpedit.msc


Now go to the path User Configuration> Administrative Templates> System


On right pane, Open Prevent access to the command prompt.


Set Enable.

Change Title Bar In Internet Explorer




Go to start > run > Type regedit > Go to the path HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main.


In right hand panel look for "Window Title". Change value to whatever you want.

Change Open Option On Right Click

Wanna to play some trick with your Right click option? This hack will change the default "Open" value to any other. Follow these steps:

Go to start > run > Type regedit > Go to the path HKEY_CLASSES_ROOT > FOLDER > SHELL > OPEN


On the right side panel, Open Default & change it's value to whatever you want.



Disable & Enable Access To USB Ports



Go to Run & Type regedit.

Go to the path: HKEY_LOCAL_MACHINE > SYSTEM> CurrentControlSet> Services> USBSTOR
In right panel, double click on Start & change its value to 4

Now I'm explaining about how to enable access to USB ports. Follow these steps:

Type regedit in run.

Go to the path: HKEY_LOCAL_MACHINE > SYSTEM> CurrentControlSet> Services> USBSTOR
In right panel, double click on Start & change its value to 3

Monday, November 19, 2012

Some Known Notepad Funny Tricks



Mostly among you will be familiar with this trick, but it's for newbie:
Open notepad and type "hack hid the facts" (without quotes), save it with any name.
Open notepad and type "this app can break" (without quotes), save it with any name.

Sunday, November 18, 2012

Notepad Write On Its Own



Hello! Wanna to do some fun with your friends? Like when your friend will open notepad file, it will start writing on its own "Hi! You Are A Fool."


Extract the Hello.vbs

Double click on it.

Notepad will start writing on its own.

Defragment Drives Using CMD



Defragment is the utility designed to reduce the amount of fragmentation. It's must important for improving your computer efficiency. For defragment any drive using CMD, follow these steps:

Open command prompt.
Type defrag volume: (where volume is your drive name like c, d, e)
Ex:- defrag.exe c: -f
For more functionality of defragmenter using cmd, type defrag /

Thursday, November 15, 2012

Increase Internet Speed By 20% In XP


Go to start 
> run 
> Type gpedit.msc 
> Administrative Templates 
> Network 
> QoS Packet Scheduler 
> Click on Limit Reservable Bandwidth and check the enabled box 
> Change the Bandwidth limit 20% to 0%.
Restart your PC & check the speed.

Monday, November 12, 2012

How To Change Drives Letter?


Wanna to change your drive letter name, follow these simple steps:
Go to Start > Run > Type diskmgmt.msc > Disk Management will be open.
Right-click on drive > click Change Drive Letter and Paths.
Click Change.
Click Assign the following drive letter if it is not already selected, click the drive letter that you want to use, and then click OK.
Click Yes when you are prompted to confirm the drive letter change.

Sunday, November 11, 2012

Turn Off Error Reporting In XP



1. Right-click My Computer and choose Properties.
2. Click the Advanced tab on your System Properties dialog box.
3. Click the Error Reporting button on the Advanced tab.
4. Place a checkmark next to "Disable error reporting."
5. Leave the other radio button unchecked next to the text labeled, "But notify me when critical errors occur."

Firefox Shortcut Keys




Ctrl + Tab or Ctrl + PageDown: Cycle through tabs.
Ctrl + Shift + Tab or Ctrl + PageUp: Cycle through tabs in reverse.
Ctrl + (1-9): Switch to tab corresponding to number.
Ctrl + N: New window.
Ctrl + T: New tab.
Ctrl + L or Alt + D or F6: Switch focus to location bar.
Ctrl + Enter: Open location in new tab.
Shift + Enter: Open location in new window.
Ctrl + K or Ctrl + E: Switch focus to search bar.
Ctrl + O: Open a local file.
Ctrl + W: Close tab, or window if there's only one tab open.
Ctrl + Shift + W: Close window.
Ctrl + S: Save page as a local file.
Ctrl + P: Print page.
Ctrl + F or F3: Open find toolbar.
Ctrl + G or F3: Find next...
Ctrl + Shift + G or Shift + F3: Find previous...
Ctrl + B or Ctrl + I: Open Bookmarks sidebar.
Ctrl + H: Open History sidebar.
Escape: Stop loading page.
Ctrl + R or F5: Reload current page.
Ctrl + Shift + R or Ctrl + F5: Reload current page; bypass cache.
Ctrl + U: View page source.
Ctrl + D: Bookmark current page.
Ctrl + NumpadPlus or Ctrl + Equals (+/=): Increase text size.
Ctrl + NumpadMinus or Ctrl + Minus: Decrease text size.
Ctrl + Numpad0 or Ctrl + 0: Set text size to default.
Alt + Left or Backspace: Back.
Alt + Right or Shift + Backspace: Forward.
Alt + Home: Open home page.
Ctrl + M: Open new message in integrated mail client.
Ctrl + J: Open Downloads dialog.
F6: Switch to next frame. You must have selected something on the page already, e.g. by use of Tab.
Shift + F6: Switch to previous frame.
Apostrophe ('): Find link as you type.
Slash (/): Find text as you type.

Saturday, November 10, 2012

Turn Off Thumbs.db


Go to Start > Run > Type gpedit.msc
Now go to User Configuration/Administrative Template/Windows Components/Windows Explorer
Scroll down to the right side of the panel. Double-Click on Turn off caching of thumbnail pictures. Click on Enable then Apply.
That's all.

Convert ALL CAPS to Small Letters

There is a very simple way to convert anĂ‚ ALL CAPITAL text string or paragraph to small letters / lowercase letters. It’s very handy for bloggers. Allright, all you need is MS Office and a keyboard!

1. Consider the following ALL CAPS text:

ANTIVIRUS, ANTISPYWARE,ANTIROOTKIT,ANTI-PHISHING, FIREWALL, ANTISPAM, PARENTAL CONTROL

2. Copy paste this in to MS Word and select the full string. Now tap the key combination Shift + F3. Bingo! your ALL CAPS text is converted into small letters. The text should look like this:

antivirus, antispyware, antirootkit, anti-phishing, firewall, antispam, parental control

3. Now if you wish to use it as a Title with the first letters of all the Words to be Capitals then you can do it as well. Just tap the Shift + F3 key combination again. The text will now look like this:

Antivirus, Antispyware, Antirootkit, Anti-Phishing, Firewall, Antispam, Parental Control

Types of Hackers

Hackers are divided into three categories:

  1. White Hat Hackers  
  2. Black Hat Hackers 
  3. Gray Hat Hackers
White Hat Hackers
They are generally security professionals white hat hackers in computer slang’s refers to an ethical hacker, a penetration or vulnerabilities tester or a security expert.

White hat hackers are computer security experts who specialize in penetration testing and other testing methodologies, to ensure security. This white hat hacker uses the computer security tools, hacker tools and tactics to find or identify the exploits or vulnerabilities and works for security.

Now basically saying white hat hackers uses hacking techniques and skills in an ethical manner i.e. in defense purposes.

Black Hat Hackers

Comparing to white hat hackers black hat hackers are villains or bad guy’s , especially as the name suggests white hat hackers uses the hacking techniques for their profit , it can be from stealing information or money  by gaining unauthorized access or by destroy vital data Or anything it means they intent to cause problems for their subjects or targets .

They break the Law, exploit Vulnerabilities, in other words they violate the system integrity with malicious intent.
Gray Hat Hackers
These hackers generally hack to learn. These types of hackers are the combination of both i.e. white hat hackers and Black hat hackers. Gray hat hackers may work for offensive purposes or defensive, depends on the situation and the choice.

There are self proclaimed ethical hackers, who are interested in gaining knowledge mostly for curious purposes. Most of the people fall in this category.

Skills of the Hacker

  1. Should possess Extensive Knowledge – This means that you need to know everything about everything. Though it sounds unrealistic, but this is true. 
  2. Should already be a security expert in other areas (like perimeter security etc). 
  3. Should have experience as network or system administrator. The concept is pretty simple, you can’t hack a PBX box, if you don’t know how to operate one. Or you can’t hack a Linux/Unix box if you don’t know various Unix commands. 
  4.  Should have good working knowledge of various OS. 
  5. Good understanding of ports, protocols and TCP/IP. 
  6. You also need to have a good understanding of common security vulnerabilities and their fixes like buffer overflow etc. 
  7. Good understanding of the various security tools and techniques.